NAVAL POSTGRADUATE SCHOOL

Size: px
Start display at page:

Download "NAVAL POSTGRADUATE SCHOOL"

Transcription

1 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) By: Mark McGovern Joseph Symmes Jeffrey D. Mayor December 2008 Advisors: Daniel Nussbaum, Raymond Franck Approved for public release; distribution is unlimited.

2 THIS PAGE INTENTIONALLY LEFT BLANK

3 REPORT DOCUMENTATION PAGE Form Approved OMB No Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA , and to the Office of Management and Budget, Paperwork Reduction Project ( ) Washington DC AGENCY USE ONLY (Leave blank) 2. REPORT DATE December TITLE AND SUBTITLE: An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) 6. AUTHOR(S) MAJ Mark McGovern, LCDR Joseph Symmes, LCDR Jeffrey D. Mayor 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 3. REPORT TYPE AND DATES COVERED Master s Thesis 5. FUNDING NUMBERS 8. PERFORMING ORGANIZATION REPORT NUMBER 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited 13. ABSTRACT (maximum 200 words) Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of the security umbrella provided. The purpose of this project is to provide a comprehensive assessment of the Joint Forces Protection Advanced Security System (JFPASS) Joint Concept Technology Demonstration (JCTD) to better meet forceprotection needs. It will also address the adaptability of this technology to an ever-changing enemy threat by the use of intelligent software. This project will collect and analyze data pertaining to the research, development, testing, and effectiveness of the JFPASS and develop an operational effectiveness model to quantify overall system performance. 14. SUBJECT TERMS Joint, Protection, Security, Fusion, Interoperable, BCA, CBRN, Force Protection, System-of-Systems, Intelligent, Software, Agents, Context, COTS, Fusion 15. NUMBER OF PAGES PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT NSN Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std UU i

4 THIS PAGE INTENTIONALLY LEFT BLANK ii

5 Approved for public release; distribution is unlimited AN OPERATIONAL UTILITY ASSESSMENT: MEASURING THE EFFECTIVENESS OF THE JOINT CONCEPT TECHNOLOGY DEMONSTRATION (JCTD), JOINT FORCES PROTECTION ADVANCE SECURITY SYSTEM (JFPASS) Major Mark McGovern, United States Army Lieutenant Commander Joseph Symmes, United States Navy Lieutenant Commander Jeffrey Mayor, United States Navy Submitted in partial fulfillment of the requirements for the degree of MASTER OF BUSINESS ADMINISTRATION from the NAVAL POSTGRADUATE SCHOOL December 2008 Authors: Mark McGovern Joseph Symmes Jeffrey D. Mayor Approved by: Daniel Nussbaum, Lead Advisor Raymond Franck, Support Advisor Terry Rea, CAPT, USN Acting Dean, Graduate School of Business and Public Policy iii

6 THIS PAGE INTENTIONALLY LEFT BLANK iv

7 AN OPERATIONAL UTILITY ASSESSMENT: MEASURING THE EFFECTIVENESS OF THE JOINT CONCEPT TECHNOLOGY DEMONSTRATION (JCTD), JOINT FORCES PROTECTION ADVANCE SECURITY SYSTEM (JFPASS) ABSTRACT Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of the security umbrella provided. The purpose of this project is to provide a comprehensive assessment of the Joint Forces Protection Advanced Security System (JFPASS) Joint Concept Technology Demonstration (JCTD) to better meet force-protection needs. It will also address the adaptability of this technology to an ever-changing enemy threat by the use of intelligent software. This project will collect and analyze data pertaining to the research, development, testing, and effectiveness of the JFPASS and develop an operational effectiveness model to quantify overall system performance. v

8 THIS PAGE INTENTIONALLY LEFT BLANK vi

9 TABLE OF CONTENTS EXECUTIVE SUMMARY...1 I. INTRODUCTION...3 A. OVERVIEW...3 B. BACKGROUND...4 C. PROBLEM STATEMENT...4 D. RESEARCH QUESTIONS...4 E. BENEFITS OF RESEARCH...5 F. METHODOLOGY...5 II. BACKGROUND...7 A. CURRENT PROBLEM...7 B. CURRENT DOD FORCE PROTECTION GUIDANCE...8 C. FORCE PROTECTION CONDITIONS...9 D. WHAT IS A JCTD?...10 E. WHAT IS THE JFPASS?...12 F. THE PURPOSE OF THE JFPASS...14 G. FIVE TASKS OF THE JFPASS...15 H. OPERATIONAL BENEFITS...16 I. SUMMARY OF CHAPTER II...16 III. IV. ENVISIONED CAPABILITIES AND USES...17 A. DESIRED CAPABILITIES...17 B. INTEROPERABILITY...18 C. EXISTING CAPABILITIES AND NEEDS...20 D. DEVELOPMENT OF THE JFPASS...23 E. THE JFPASS USED FOR INFRASTRUCTURE...24 F. SUMMARY OF CHAPTER III...26 DEFINING THE JFPASS...27 A. INTRODUCTION...27 B. WHAT DOES INTELLIGENCE MEAN TO THE JFPASS...28 C. WHY IS CONTEXT IMPORTANT IN DEFINING THE JFPASS...29 D. DATA-CENTRIC ENVIRONMENT Current Situation and the Need for Intelligent Software Transition from Data to Information by Intelligent Software...30 E. ONTOLOGY OF INTELLIGENT SOFTWARE...33 F. RISK Considerations for Systems of Systems Scale to Size and Complexity of Systems of Systems...36 G. SUMMARY OF CHAPTER IV...37 V. RESULTS...39 A. INTRODUCTION...39 B. DEMONSTRATION STRATEGY...39 vii

10 C. OPERATIONAL VIEW...40 D. ANALYSIS Importance (Scope) Collection Quantitative Analysis Method...43 a. Data Interpretation...43 b. Data Analysis Quantitative Results...47 a. Measuring the Results...47 b. Interpreting Results...48 E. PROGRESS AND CHANGE...50 VI. DISCUSSION...51 A. CONCLUSIONS The Need for Better Force Protection Capabilities The Way to Fill the Need of the WF with the JFPASS...51 B. RECOMMENDATIONS What are the Needs that are the Focus of the JFPASS from the WF s Perspective? Work to Mitigate the Risks Associated with the JFPASS...52 C. PAYOFF...53 D. WHAT IS NEXT FOR THE JFPASS...53 E. FUTURE RESEARCH...56 APPENDIX A. JFPASS SURVEY IRB APPROVAL MEMORANDUM...57 APPENDIX B. DESIRED CAPABILITIES RELEVANCE SURVEY INSTRUCTIONS...59 APPENDIX C. DESIRED CAPABILITIES RELEVANCE SURVEY...63 APPENDIX D. JFPASS SURVEY PREFERENCE ROLLUP...65 APPENDIX E. SURVEY PREFERENCE RESULTS...73 APPENDIX F. POLAR GRAPH OF STANDARD DEVIATION OF NEAR REAL TIME RESULTS...75 APPENDIX G. MEASURE OF EFFECTIVENESS CALCULATION TOOL APPENDIX H. MEASURE OF EFFECTIVENESS CALCULATION TOOL LIST OF REFERENCES...81 INITIAL DISTRIBUTION LIST...87 viii

11 LIST OF FIGURES Figure 1. JCTDs Bridge S&T and Acquisition (JCTD POG v1.0, 2008, April 11, 2008)...11 Figure 2. Desired Capabilities Provided by the JFPASS...13 Figure 3. Conceptual Systems View of the JFPASS...19 Figure 4. Transition from Data to Knowledge (Pohl, 2005)...32 Figure 5. Basic Risk Management Process Model...35 Figure 6. Operational View of the JFPASS...41 Figure 7. Mapping Tasks to Capabilities (JFPASS JCTD MTP, 2008, July 11)...43 Figure 8. Relative Weights Graph of Forced Means Score...44 Figure 9. Near Real Time shown as a representation of means dispersion in a polar format...45 Figure 10. Overall Effective Score Calculation Model...46 Figure 11. Overall Measure of Effectiveness show as a representation of means dispersion in a polar format...46 Figure 12. Sample Survey Format...47 Figure 13. Measure of Effectiveness Calculation Tool Figure 14. BCA Diagram...54 Figure 15. Operational Effectiveness Score Flow Chart...55 ix

12 THIS PAGE INTENTIONALLY LEFT BLANK x

13 LIST OF TABLES Table 1. Advantages of Human Simulation...33 Table 2. Advantages of Computer Simulation...33 Table 3. Common Systems of Systems Risk Management Issues (Conrow, 2005)...36 Table 4. JFPASS JCTD Schedule...40 xi

14 THIS PAGE INTENTIONALLY LEFT BLANK xii

15 LIST OF ABBREVIATIONS AND ACRONYMS ACC ACTD ADUSD (AS&C) ADM AI AO APB ATEC ATO BCA C&A CBA CCB CCTV CD CDD CBRNE COCOM COI CONEMP CONOPS CONUS COP COTS/GOTS CPM CRB DIACAP DoD DOTMLPF DSS ECP ECPS EU FCB FOB FP FPCON FPJE FY Air Combat Command Advance Concept Technology Demonstration Assistant Deputy Undersecretary of Defense (Advanced Systems and Concepts) Acquisition Decision Memorandum Artificial Intelligence Area of Operation Acquisition Program Baseline U.S. Army Test and Evaluation Command Authority to Operate Business Case Analysis Certification and Accreditation Capabilities-based Assessment Configuration Control Board Closed-circuit Television Compact Disk Capability Development Document Chemical, Biological, Radiological, Nuclear and Explosive Combatant Commands Critical Operational Issues Concept of Employment Concepts of Operations Continental United States Common Operational Picture Commercial Off-the-shelf/Government Off-the-shelf Capability Portfolio Manager Candidate Review Board DoD Information Assurance Certification Accreditation Process Department of Defense Doctrine, Organization, Training, Materiel, Leadership, Personnel, and Facilities Decision Support System Entry Control Point Entry Point Control System Extended Use Functional Capability Boards Forward Operating Base Force Protection Force Protection Condition Force Protection Joint Experiment Fiscal Year xiii

16 GAO GIS GPS GSR GWOT IA IAP IATO IC ICD ICD IED IEEE IFF IGSSR ILD IPP IPP ISSM IUBIP JBC2S JCIDS JCTD JCS JE JFCA JFCOM JFPASS JPEO-CBD JPMG JSSG KSA C2 LCC LOC LOUA LRIP MAA M&S MANPADS MANSCEN MDARS MIPR MOE Government Accountability Office Geospatial Information Systems Global Positioning System Ground Surveillance Radar Global War on Terror Integration Assessments Integrated Assessment Plan Interim Authority to Operate Interim Capability Initial Capabilities Document Interface Control Document Improvised Explosive Devices Institute of Electrical and Electronics Engineers Identification Friend or Foe Integrated Ground Security Surveillance and Response Integrated Locking Device Installation Protection Program Internet Protocol Information Systems Security Manager Integrated, Unit, Base, and Installation Program Joint Battlespace Command and Control System Joint Capability Integration Development System Joint Capabilities Technology Demonstration Joint Chiefs of Staff Joint Experimentation Joint Functional Capability Area Joint Forces Command Joint Force Protection Advanced Security System Joint Program Executive Office Chemical Biological Defense Joint Project Manager Guardian Joint Service Steering Group Knowledge, Skills and Abilities Command and Control Lifecycle Cost Lines of Communication Limited Operational Utility Assessment Low-rate Initial Production Mission Area Analysis Modeling and Simulation Man-portable Air Defense Systems Maneuver Support Center Mobile Detection Assessment and Response System Military Interdepartmental Purchase Requests Measure of Effectiveness xiv

17 MOP Measure of Performance MTP Management and Transition Plan NNMSA Non-nuclear Material Storage Area NPS Naval Postgraduate School OD Operational Demonstration OGA Other Government Agency OIS Office of Intelligence and Security OM Operational Manager OSD Office of the Secretary of Defense OTD Open Technology Development OUA Operational Utility Assessment OV-1 Operational View -1 PBIED Personnel-borne Improvised Explosive Devices PE Program Element POC Point of Contact POG Practical Operating Guidance POM Program Objective Memorandum POR Programs of Record PPBE Planning, Programming, Budgeting, and Execution PSA Program Support Agreement PSDS2 Persistent Surveillance and Dissemination of Systems PSEAG Physical Security Equipment Action Group QRF Quick Reaction Force QTR Quarter RAM Rockets, Artillery, and Mortar REF Rapid Equipping Force RF Radio Frequency ROC Regional Operations Center ROWS Remotely Operated Weapon Systems RPG Rocket-propelled Grenades S&T Science and Technology SAMP Simplified Acquisition Management Plan SDD Systems Development and Demonstration SEIWG Security Equipment Interface Working Group SETA Scientific, Engineering, and Technical Assistance SF Special Forces SIPRNET Secret Internet Protocol Router Network SME Subject-matter Experts SOF Special Operations Forces SOFA Status Of Forces Agreements SSAA Systems Security Accreditation Agreement SSCG System Security Classification Guide SV System View TASS Tactical Automated Security System TD Technical Demonstration xv

18 TI TM TRL TTA TTP UAV UGS UGV USAFE USEUCOM or EUCOM VBIED VMD XM YOE ZBV Technology Integrator Technical Manager Technology Readiness Levels Technology Transition Agreement Tactics, Techniques, and Procedures Unmanned Aerial Vehicles Unattended Ground Sensors Unmanned Ground Vehicles United States Air Forces Europe United States European Command Vehicle-borne Improvised Explosive Devices Video Motion Detection Transition Manager Year of Execution Z Backscatter Van xvi

19 ACKNOWLEDGMENTS First and foremost, the group would like to thank our advisors, Prof. Dan Nussbaum and Prof. Raymond (Chip) Franck, for their tireless efforts in helping us complete our project. Their advice and guidance were key in making this project a success. MAJ Mark McGovern would like to thank his fellow group members for their hard work and relentless efforts to ensure project completion. He would also like to thank his wife for her understanding of long hours after school and late nights during this process. Her support was instrumental in the mental and physical drive that sustained the journey to success. He would also like to thank his children for their tireless efforts to delete the entire project from this home computer in attempts to see what the all those buttons do that daddy uses all the time. LCDR Joe Symmes would like to thank both Mark and JD for their contributions to this project. The group worked extremely well together, each member pulling the load in his area of expertise. He would also like to thank his wife and children for their support and encouragement through the long hours of research and writing. LCDR J.D. Mayor would to thank Mark and Joe for their tireless efforts and devotion to mission accomplishment. He would also like to thank Prof. Nussbaum and Prof. Franck for their support in helping complete the project. Also, a special thank you goes to his family. The team would also like to thank the JFPASS team for their support and all the information and time given to this project. xvii

20 THIS PAGE INTENTIONALLY LEFT BLANK xviii

21 EXECUTIVE SUMMARY As of this writing, the Joint Force Protection Advanced Security System (JFPASS) Joint Capability Technology Demonstration (JCTD) is the newest initiative of this type and is sponsored by the Office of the Secretary of Defense (OSD). The JFPASS goal is to find a common core of communication protocols that will bring interoperability of legacy and future force protection systems in order to provide a better means of perimeter security. The Army is the lead service in this endeavor and has provided the Transition Manager (XM). The Navy provided the Technical Manager (TM), and U.S. European Command (EUCOM) has provided the Operational Manager (OM) (JFPASS JCTD MTP, 2008, July 21). The JFPASS supports the Global War on Terror (GWOT) by providing Combatant Commands (COCOMs), services, agencies and our allies with near-real-time, integrated/interoperable, comprehensive land and maritime-based regional and local Force Protection (FP) systems to counter threats. This is a precedent-setting solution to joint FP (2008, July 21). The JFPASS integrates Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) and Physical Security systems through the application of an integrated Command and Control (C2) Architecture that uses tailored decision rules. The JFPASS provides actionable information and allows users to focus choosing the response. The JFPASS JCTD architecture consists of nodes that together constitute a suite of sensors. These nodes are connected to a C2 system -- rather than sensors connected directly to a C2 system (2008, July 21). Although the JFPASS is capable of connecting directly to sensors, the strength of the system is its ability to integrate legacy, existing, and emerging systems (2008, July 21). Using Intelligent Software as the enabling agent, JFPASS will provide the integration for the C2 Architecture and will provide the next evolution of technology information. Current technologies, CONOPS, and policies do not provide a comprehensive, effective, and sustainable joint force protection capability. Fielded force protection 1

22 systems do not interoperate and integrate effectively nor do they provide comprehensive and integrated situational awareness. Existing service stovepipe systems need to be joined into a single, integrated FP system-of-systems. The JFPASS has the potential to enhance FP using Unmanned Systems, Integration Fusion and Analysis software system; this means actionable information can be presented in a timely manner, allowing the WF to focus on orchestrating responses such as deploying Quick Reaction Forces (QRFs). The JFPASS can also provide cost savings through standardization and effective use of manpower (2008, July 21). 2

23 I. INTRODUCTION A. OVERVIEW This report presents an overview of the need for increased FP. With a growing list of adversaries, including hostile states and transnational terrorist organizations, the nature of warfare has changed. Accordingly, U.S. forces have shifted from a commandand-control model to a sense-and-respond model (Lin, Luby, & Wang, 2004, p. 26). Since the U.S. Department of Defense (DoD) must respond to threats against American citizens or the military, it continuously explores new technologies to field capable force protection equipment. As the largest defense organization in the free world, the DoD recognizes the need for the safety and protection of its fighting forces. The Joint Force Protection Advance Security System (JFPASS) can improve current FP to a highly effective level. It is centered on integrating communication protocols and applying commercial off-the-shelf (COTS) technologies to provide superior force protection capability in and around Forwarding Operating Bases (FOBs). For the purpose of this report, an FOB is any secured forward position that is used to support tactical operations. An FOB may contain an airfield, hospital or other facilities, and it may or may not be used for an extended period of time. FOBs are traditionally supported by main operating bases. An FOB can reduce reaction time and increase timeon-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a fortified entry control point (ECP). More advanced FOBs include assemblies of earthen dams, concrete barriers, gates, watchtowers, bunkers and other force protection infrastructure (Forward operating base, 2008). 3

24 B. BACKGROUND In the course of this project, the team conducted a literature review. The background provides the foundation regarding the DoD s problem in communications and interoperability of force protection systems. Also, the project will show how potential solutions to this problem are being assessed through the JCTD process. C. PROBLEM STATEMENT As the JFPASS JCTD Management and Transition Plan explains, Currently, U.S. Joint and coalition FP systems are inadequate and lack the ability to provide comprehensive, effective sustainable FP and critical asset protection capabilities (JFPASS JCTD MTP, 2008, July 21). Researchers will assess JFPASS as a solution to this problem. D. RESEARCH QUESTIONS Our primary aim is to help assess the extent to which the JFPASS can increase ability to enhance joint service force protection against an adaptive threat. The project will focus on the following research questions: How do the services operate with current security measures and actions, and is there a robust adaptability to changing threats? What types of management structures are used to assess security measures? Are they contracted services? What types of training are required for Force Protection (FP) personnel to operate and/or implement within the joint forces community when received? To what extent do the respective military services acquire and manage force protection equipment/services separately? Is this beneficial to the DoD acquisition strategy? To what extent can JFPASS assist in preventing military and civilian causalities? What benefits does JFPASS provide relative to what is already used? What is the "force protection" model used to design JFPASS? 4

25 Is the JFPASS a single-scenario design? (e.g., expeditionary units like SEALS, Rangers, or LRSC) Or is it designed for a broad range of applications? E. BENEFITS OF RESEARCH The JFPASS has the potential to facilitate a more efficient use of resources both operationally and logistically. Specifically, this research project will: Support an assessment of the suitability of the JFPASS JCTD for transition to a Program of Record. Contribute to a comprehensive understanding of how joint force protection is acquired and of the adaptability of the force protection means currently in use. Provide information that can be incorporated into recommendations for future force protection acquisitions by means of intelligent software. Assess the utility of the JFPASS concept of COTS interoperability. Investigate the possibility of future uses of the JFPASS in homeland defense against possible terrorist activities. F. METHODOLOGY For this project, we used an exploratory case study as our primary methodology. We employed a triangulation method to gather qualitative data. Three points were considered: interviews of JFPASS JCTD program representatives, relevant publications, and an exploratory survey of force protection reports. We used the survey to map five key force protection tasks to eight desired capabilities in order to asses the relative importance of each capability from an operations perspective. Data gathered from the survey was used to build a utility function as a metric for the JFPASS s operational capability. The research team believes the following areas pose the greatest problems in FP at present: (1) adaptability (speed), (2) interoperability (plug-and-play), and (3) effectiveness. We address each in our analysis. 5

26 THIS PAGE INTENTIONALLY LEFT BLANK 6

27 II. BACKGROUND A. CURRENT PROBLEM The terrorist attacks of September 11, 2001, resulted in a renewed interest in FP. A variety of new products ranging from fire-resistant clothing to unmanned aerial vehicles received serious DoD attention. The challenge is now in the integration of the available products into one cohesive and adaptable system. Base defense is a key component of the force protection mission. The JFPASS JCTD Management and Transition Plan explains: The problem is the result of outdated capabilities, Concept of Operations (CONOPS) and policies. The excessive variants and redundancies in FP capabilities limit the Joint Force in its ability to share information across the services, agencies and partner nations. The outdated information and data exchange standards also limit the ability of the services, agencies and our partner nations to share and exchange data in order to maintain situational awareness of an ever vigilant and changing threat. The myriad of FP systems and inconsistent standards between systems severely limit their ability to communicate warnings rapidly from a single node to subordinate units and commands throughout the services and agencies. The limited interoperability between the various systems increases the total cost of ownership for FP systems due to inefficient manpower utilization and the high cost of maintaining multiple systems and spare parts. The current problem causes an unacceptable level of risk for critical and sensitive asset protection as well as unaffordable costs associated with operating and maintaining these different systems. (2008, July 21) However, the technology development response has been sluggish thus far. BG Phillip Coker, Director of Capabilities Developments at the Futures Center at Army Training and Doctrine Command, states, It is important to think through and find the right solutions, not solve the wrong problem ( Army Identifies Capability Gaps, 2004, June 3, p. 1). In order to do so, the U.S. must focus our efforts on a systematic approach to finding and implementing the right solutions to real-world problems with the right degree of force protection. 7

28 B. CURRENT DOD FORCE PROTECTION GUIDANCE Since September 11, 2001, the DoD has been proactive in protecting its infrastructures and personnel from acts of terrorism. DoDI addresses DoD s Antiterrorism (AT) standards and is applicable to the Office of the Secretary of Defense (OSD), Military Departments, Chairman of the Joint Chiefs of Staff, Combatant Commands, Defense Agencies, DoD Field Activities, and all other DoD organizational entities (DoD, 2006, October 2, p. 2). The Instruction further addresses the DoD s Policy and Responsibilities as follows: POLICY OBJECTIVES 1. To protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts. 2. To establish AT standards for the Department of Defense. 3. That commanders at all levels shall have the authority to enforce security measures and are responsible for protecting persons and property subject to their control. 4. That Geographic Combatant Commander AT policies and programs shall take precedence over all AT policies or programs of any DoD Component operating or existing in that command s area of responsibility (AOR) except for those under the security responsibility of a Chief of Mission (COM). 5. That the DoD elements and personnel not falling under the AT policies and programs of a geographic Combatant Commander [ ], shall comply with the Overseas Security Policy Board Security Standards. 6. That non-dod tenants on a DoD installation, facility, or other DoD property must comply with all aspects of the DoD AT program addressed in this Instruction and other AT guidance documents. 7. That functional Combatant Commanders will support geographic Combatant Commanders as they exercise overall AT responsibility within their AOR. (2006, October 2, p. 2) 8

29 C. FORCE PROTECTION CONDITIONS DoD Force Protection Conditions (FPCONs) is a DoD-approved system that standardizes security measures to protect U.S. personnel and facilities from terrorist attacks. The five progressive FPCON levels of force protection are listed below: 1. FPCON NORMAL: Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture. At a minimum, access control will be conducted at all DoD installations and facilities. 2. FPCON ALPHA: Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, and the nature and extent of the threat are unpredictable. ALPHA measures must be capable of being maintained indefinitely. 3. FPCON BRAVO: Applies when an increased or more predictable threat of terrorist activity exists. Sustaining BRAVO measures for a prolonged period may affect operational capability and military-civil relationships with local authorities. 4. FPCON CHARLIE: Applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely. Prolonged implementation of CHARLIE measures may create hardship and affect the activities of the unit and its personnel. 5. FPCON DELTA: Applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is imminent. This FPCON is usually declared as a localized condition. FPCON DELTA measures are not intended to be sustained for an extended duration. (DoD, 2006, October 2, p. 39) 9

30 Each FPCON level encompasses site-specific AT security measures. FPCON protective measures are used to assist DoD components in reducing the risks of terrorist attacks and other security threats to DoD personnel, units, and activities (p. 39). Upon declaration of a FPCON level, commanders are responsible to immediately implement all applicable AT security measures for that FPCON level unless the requirement is waived in writing by a competent authority (p. 40). Baseline FPCON levels and applicable measures are listed in Enclosure 4 of DoDI The instruction lists shipboard security measures separately; these are tailored to assist commanding officers and ship masters in reducing the effect of terrorist and other security threats to DoD combatant and non-combatant vessels including U.S. Army and Military Sealift Command ships worldwide (p. 40). D. WHAT IS A JCTD? This Joint Capability Technology Demonstration (JCTD) Program has entered its third year of exploring new ways to provide a greater advantage against changing threats. The following is an excerpt from the JCTD Program Practical Operating Guidelines (POG): The Joint Capability Technology Demonstration (JCTD) Program attempts to improve turnaround time from operational problem identification to operational capability. The Deputy Under Secretary of Defense for Advanced Systems and Concepts (DUSD [AS&C]) initiated the JCTD program in 2006 as a result of a top-down review of the Advanced Concept Technology Demonstration (ACTD) Program. In Fiscal Year (FY) 2006, the DUSD (AS&C) initiated the JCTD Program to enhance and accelerate the support to the joint, coalition and interagency WF s and users in this era of the global war on terrorism. (JCTD POG v1.0, 2008, April 11, 2008) 1 1 Executive Summary, Joint Capability Technology Demonstration (JCTD) Program Practical Operating Guidelines (POG) Narrative Description v1.0 (11 April 2008). 10

31 Figure 1. JCTDs Bridge S&T and Acquisition 2 (JCTD POG v1.0, 2008, April 11, 2008) In that regard, the JCTD model is oriented to fill specific WF needs. Application of the model is an effective method for the DoD to fill requirements by emphasizing a needs pull over a technology push methodology, as the following statements attest ( U.S. DoD Announces, 2008, January 30): A JCTD enables faster project start-up by providing more resources earlier in the traditional two-year DoD budget cycle and a flexible start process that facilitates urgently needed combatant command-driven capabilities throughout the fiscal year. A key aspect of the JCTD program is the transition planning process, which seeks to deliver enduring capabilities to the combatant commands. The JCTD program also demands faster fielding of interim capabilities [and] structures funding to provide incentives for military service and agency participation without requiring the services or agencies clear visibility in their participation of joint efforts. (2008, January 30) The JCTD model seeks the 70% 80% solution now, rather than delaying delivery to obtain the 100% answer years from now (JCTD POG v1.0, 2008, April 11). The advantage the JFPASS gains from the JCTD model is the streamlining process and utilization current technologies to meet the 70% 80% objective. 2 Executive Summary, Joint Capability Technology Demonstration. 11

32 E. WHAT IS THE JFPASS? The JFPASS is the fusion cell of a Command and Control software suite designed to create the interoperability of numerous COTS, enhancing FP for an array of units. This will allow all branches of the U.S. military to harness the benefits of one joint force protection system. Intelligent Software is the primary means in which the JFPASS intends to accomplish providing the enhanced FP. 1. SCOPE OF THE JFPASS JCTD One recent article elaborates on the scope of the JFPAS system: JFPASS integrates and automates access control and perimeter security for expeditionary military installations. JFPASS Demonstrates an integrated system-of-systems to protect expeditionary military installations, incorporates comprehensive situational awareness for force protection providers, reduces manning due to systems integration and robotics, and reduces logistics cost. Functional areas for installation protection addressed include: perimeter security, chemical-biologicalradiological defense, access control, nonintrusive inspection, and waterside security. ( U.S. DoD Announces, 2008, January 30, p. 2) 2. WHAT THE JFPASS PROVIDES This same article explains the benefits the system is expected to provide: JFPASS JCTD will provide improved situational awareness to protect humans from unnecessary risks, and facilitate the processes of detecting, assessing, warning, defending, and restoring a normal operational capability. The focus will be on the response within Detect, Assess, and Warn functions. Enablers for response are the COP and the use of connected Unattended Ground Sensors (UGS) and unmanned systems, through the integration of legacy systems and automated responses. (2008, January 30) 12

33 From To Surveillance Systems Unmanned Systems Common Operational Picture Figure 2. Desired Capabilities Provided by the JFPASS 3 (JFPASS JCTD MTP, 2008, July 21) As seen Figure 2, the JFPASS has the potential to bring protection support from fort to foxhole by providing next-generation passive capabilities (JFPASS JCTD MTP, 2008, July 21). In order to accomplish this, the JFPASS will have to incorporate new technology not just hardware but software as well. According to Mr. Carlos Lama, JFPASS JCTD Program Manager, current force protection systems are disjointed and inefficient (2008, July 21). Thus supporting the need for a joint security system that can be used anywhere by any branch in austere locations against an unknown threat. Additionally, the DoD recognizes that current force protection technologies do not provide a comprehensive, effective, and sustainable joint force protection capabilities (2008, July 21). Current systems create waste through redundancy and misuse of limited manpower and, therefore, do not provide the situational awareness needed by the WF (2008, July 21). Prior to this JCTD, there was no indication of a systematic approach to address such shortfalls. The lack of a future DoD force protection vision has been a barrier to resolving such a problem. The Army is keenly aware of this problem. Gen. Peter Schoomaker, 3 JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP). Vers (2008, July 11). Washington D.C., Guardian Six Headquarters. 13

34 Army Chief of Staff, tasked his subordinates to find science and technology solutions for the current and future force gaps and, where possible, accelerate fielding of future capabilities to improve current force effectiveness ( Army Identifies Gaps, 2004, June 3, p. 1). Disjointed supply lines and maintenance/repair capabilities also fragment the effectiveness of current force protection equipment issued to WFs. Interoperability is an essential element in the success of any system designed to defeat a changing threat. The needs to reduce risk, increase effective Command and Control (C2) and reduce cost are catalysts for the development of the JFPASS for base defense. However, interoperability and the aforementioned elements are not the sole considerations. Speed is also a key element in the development of the JFPASS. Speed in set-up, becoming operational, break-down, and transport are essential to the light, elite units that will find this system most useful. Is there a speed versus interoperability tradeoff that needs to be addressed? This is a question that needs to be answered by the WF. In their December 2007 NPS study, D'Angelo, Houglan, and Ruckwardt state: Service components are responsible to train and equip the WF while geographical combatant commands conduct military wartime contingency operations. Each service provides trained and equipped forces to the combatant commanders giving the commanders the capability to execute contingency operations. Although these capabilities consist of each service s core competencies, the combatant commanders are left with a void that only can be filled by external resources. (p. 4) Agencies outside the DoD need to conduct research and development of technology that can provide systems to keep the military ahead of its adversaries and the U.S. safe by filling that void. Exploring intelligent software to alleviate some of the burden placed on manpower can assist in this problem F. THE PURPOSE OF THE JFPASS The JFPASS can potentially fill a national force protection need. Its adaptability may be broad enough to allow an application to homeland defense applications as well as military perimeter security. 14

35 As stated in the overview, the overriding objective of this project is to analyze the effectiveness and adaptability of the JFPASS in defeating the ever-changing enemy threat. This project will investigate, analyze and assess the JFPASS. In addition, this project will provide the basis for our recommendation and assessment of the JFPASS potential to become a program of record. G. FIVE TASKS OF THE JFPASS The following five FP tasks are key elements to JFPASS system effectiveness according to the JFPASS JCTD MTP: 1. Detect: The JFPASS will demonstrate the ability to detect threats using an integrated system of sensors (including cameras, radar, and CBRNE detection) and automated anomaly detection and alarming; these capabilities will reduce the need for human interaction with the system and will provide consistent detection probability results. The synergistic effect between sensor data and the JFPASS fusion engine will result in an improved response both in the time required to recognize a threat and the ability to do so at greater distances from vital assets. 2. Assess: The JFPASS will integrate the sensors into an automated, centrally controlled processing station(s), which will evaluate the input from each of the sensor systems. The JFPASS will automate the assessment process by comparing the nature of any anomaly detected by the system to the current understanding of any known threat; by doing so, it will assess the potential for the anomaly to become a threat (i.e., presence of explosive components or precursors). The JFPASS will then automatically provide the system operator with recommended courses of action. 3. Warn: The JFPASS will automate the process of disseminating alerts and warnings over a multi-tiered/multi-mode communications system ranging from loud speakers to automated s and text messages. The system will provide situational awareness and information for decision-makers. An inter-networked system of JFPASS-enabled units, bases and installations will disseminate warnings in order to mitigate the effects of dispersed coordinated attacks. 4. Defend: The JFPASS will automate the defense actions by centrally managing the deployment of passive defensive measures and by providing the local commander with situational awareness regarding the status of the defensive measures. These measures 15

36 include, but are not limited to, the recommendation to implement a change in the FP Condition (FPCON), the automatic deployment of barriers and the use of robotics for threat intervention. 5. Recover: Although the JFPASS will not directly contribute to the recovery function, the synergistic effect of integration and automation within the other areas of the FP construct will help in resuming effective operations and provide a deterrent against further attacks. (2008, July 21) H. OPERATIONAL BENEFITS The operational aims of the JFPASS are to integrate, automate, and leverage the benefits of integrated systems for joint force protection. The JFPASS will address this need by integrating C2 architecture and will include the following (list comes from the PP presentation created by Lama, K. in 2007, October 24) which indicates the benefits. Standard/scalable connectivity (plug-and-play) Common and integrated operational picture Decision support system Reduced workload Affordable logistics and maintenance (2007, October 24) I. SUMMARY OF CHAPTER II This chapter discussed the need for the DoD use of new technology to provide WFs with a better defense against a varied and changing threat. The JFPASS is intended to enhance force protection by providing a base defense security system that can detect, detour, and defeat a wide range of threats, while making efficient use of financial and manpower resources. This chapter outlined the rationale for the JCTD model in general, and the JFPASS in particular. Chapter III will explore the envisioned capabilities and uses the JFPASS will provide to the WF. 16

37 III. ENVISIONED CAPABILITIES AND USES A. DESIRED CAPABILITIES JFPASS potentially offers new and desired capabilities to the WF in the FP arena. With the threat of attacks coming from a multiple of enemies, a robust system is needed to provide better and more accurate information about the threat. The JFPASS aims to do this with the following: 1. Near Real Time/Integrated/Interoperable, Comprehensive Land and Maritime-based Reg balanced Local Force Protection (FP) Systems; Common Operating Picture (COP) tailored to suit the user s information requirements and built from fused sensor and other information sources. 2. Scalable FP area of interest to support a single integrated group (military and civilian) 3. Compliance with regional requirements (e.g., laws, regulations, SOFAs) 4. Suite of systems under a central core, ability to share information (voice data and video) with subordinate units, higher headquarters, and adjacent C2 nodes. 5. Standardized core systems training, common baseline of equipment, interface, and training standards which reduces the total lifecycle cost of ownership and facilitates the plug and play use of components among the Services and our coalition partners 6. Internationally releasable system suite (between partner nations) 7. A decision aide to select a system suite for various applications/environments 8. CONOPS and TTPs developed for the employment of the integrated system of systems (JFPASS JCTD MTP, 2008, July 21). 17

38 B. INTEROPERABILITY The JFPASS aims to incorporate comprehensive situational awareness to reduce manning through the use of systems integration and robotics. According to the JFPASS JCTD MTP, the system: Will maximize COTS hardware and software while leveraging existing FP systems. To minimize the impact to legacy interfaces/standards the JFPASS JCTD will apply SEIWG ICD-0100 as the standard communication/data exchange protocol. This approach allows the JFPASS JCTD to minimize changes to communications systems or networks while at the same time maintaining the ability to revert to legacy systems. In addition, this approach provides a systems architecture with no single point of failure and plug and play functionality. (2008, July 21) While complex in explanation, the physical system is simple. The graphic in Figure 3 depicts the systems nodes and the systems resident at each node to support the JFPASS JCTD operations. It also identifies the interfaces between the systems and the systems nodes. As illustrated, the core technology of the JFPASS JCTD is the Fusion Automation and Decision Support System (DSS) hub (2008, July 21). 18

39 Figure 3. Conceptual Systems View of the JFPASS 4 (JFPASS JCTD MTP, 2008, July 21) To augment the system, certain external components can enhance detection ability. These include thermal imaging, mobile patrol, and radars. Infrared detectors can be used to help find targets at night or in complete darkness. Such technology could be helpful to combat night attacks. Mobile patrol sensors, such as unmanned patrol craft, can be used on land, air, or sea. This technology can be mounted on land vehicles, small boats, or aircraft. The U.S. Army has installed a version of this technology on its Mobile Detection Response System (MDARS). This new technology has been successful in detecting intruders out to JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP). Vers (2008, July 11). Washington D.C., Guardian Six Headquarters. 19

40 meters. Finally, surveillance radars such as SQUIRE can be used to detect moving ground targets. SQUIRE is surveillance radar that detects moving targets along the ground at long ranges. This technology can be used to protect oil fields, bridges, waterways, and other valuable sites. The aforementioned technologies are further explained by Andres Childress, an expert in Security Management: Thermal Imaging Technology objects detection and identification, tracking, surveillance, threat warning, damage assessment, and communications. Examples of this technology are found in optical target designators, radars, laser rangefinders/designators, and vehiclemounted Infrared Search and Track and Forward-Looking Infrared packages in combination with secure real-time data links and decision and navigation aids (Endress, 2007, July, pp ). Mobile Patrols same as thermal Imaging Technology but conducted at sea, air, or ground. Examples of mobile patrols are found in naval patrol boats and surveillance aircraft (p. 80). Ground Surveillance Radars Protect airports, industrial processing facilities, power plants, or areas of special interest by detecting terrorist activities and illegal infiltration. Examples of this are the SQUIRE Surveillance radar and the EL/M-2128 Miniature Detection Radar, often referred to as MINDER (p. 80). The JFPASS will be utilized to facilitate control of various off-the-shelf surveillance systems to protect U.S. military assets, infrastructures, and people from terrorist attacks. C. EXISTING CAPABILITIES AND NEEDS Integrated security systems such as Tactical Automated Security System (TASS) served as the predecessor to the JFPASS. TASS developer, Col Russell Peter, USAF stated in an interview conducted by Air Force News Service, that the challenge is to develop a force protection system that is integrated with the many other systems already being employed (Heitman, 1997, p. 1). A shift in force protection priorities that Col Peter observed in 1997 was toward the protection of people rather than high-value areas (p. 1) "In the past, most of the effort has been to protect weapons storage areas or high 20

41 value areas," Peter said. "While that is still important, we are concentrating on the risk to people. With terrorist activity becoming so common, we have to worry about truck bombs, for instance" (p. 3). Force protection integration not only includes current weapon systems but also infrastructure such as medical, civil engineers, and communication systems. Representatives from some of these areas have deployed abroad to help establish security systems. This move is in sharp contrast to the traditional military security teams who would have previously had the exclusive responsibility of setting up the perimeter security system. (p. 3) Increased awareness of what is happening in this stand-off area can lead to enhanced forced protection. With more threat warning, people and assets can be better protected from terrorists (p. 3). According to Col. Peter, a key element to the future of force protection is looking beyond the base perimeter; observing what is happening in the stand-off area outside of the gate, can provide a valuable early warning to impending danger (p. 2). A system such as JFPASS can provide additional portable force protection against immediate threats similar to TASS (Carey, 1998). The force protection function has been historically dedicated to physical security, but the TASS program has been expanded to integrate intelligence functions and to provide enhanced detection and assessment of intrusions to designated sites and their perimeter areas (1998). Col. Peter explained: Our goal was to develop a security system that would overcome problems the labor-intensive nature, complex installation, cabling requirements that traditional security systems posed for segments of the military that required mobility and rapid deployment. A mobile, modulartype security system, one that was wireless, that would work during the dark desert nights, that could be put together and transported on not more than two airplane pallets, and that could be ready to go in the event of an international crisis. (Heitman, 1997, p. 3) The advance warning or notification, however, was impossible to achieve at that time. In November 1997, Col. Peter said, Modeling and simulation can show us where the threat zones are, so we know where we need to put more people or sensors; yet, he 21

42 added that no specific systems fill this gap, but by combining things like unmanned aerial vehicles, satellites and other existing technologies, force protection needs can be filled (p. 2). Peter s explanation was expanded in a separate article: Our vision for this new program office is to be a world class leader in applying technology to force protection command and control systems for the safety, security and survivability of U.S. warfighting assets, WFs and dependents worldwide (Carey, 1998). Many of the JFPASS specific capabilities already exist. Internal to the Army, funding for a new development program called the Mobile Detection Assessment and Response System (MDARS) is ongoing. This system consists of an autonomous vehicle designed to provide intrusion detection and inventory assessment (Tiron, 2004). Equipped with various radars for both scanning and navigating, it can be programmed to patrol an area and record anything within radar range. The platform also includes an RFID sensor that can inventory material inside secure storage locations or containers (2004). Other equipment for possible integration includes a HMMWV with a 30-foot radar mast added to the top. Vehicles such as this can be temporarily positioned in strategic locations to provide detailed coverage for a surveillance area. The Mobil Detection Assessment and Response System (MDARS) is designed to operate with the Army s future combat systems or other unmanned vehicles with little assistance from the end user. The MDARS can be upgraded with various communication/interrogation packages to fit particular mission needs and particular platforms. Everything from an all-weather surface detection to ballistic and nuclear biological and chemical threat detection may be performed with this system on an array of different platforms. This could be an important system to expand the JFPASS component capability. However, the MDARS does not solve the interoperability problem. Adding more equipment to the mission is subject to diminishing marginal returns. Interoperability is the answer, not more equipment. 22

43 D. DEVELOPMENT OF THE JFPASS ViaLogy LLC, a subsidiary of ViaLogy PLC, was chosen by the DoD for joint experiments to develop Joint Forces Protection and Base Security Systems to support the JFPASS JCTD. ViaLogy was selected to provide a command and control (C2) platform for the experiments ( ViaLogy PLC, 2007). At a recent integration assessment supporting the JFPASS, two systems Northrop Grumman s TASS and Joint Battlespace Command and Control Station (JBC2S) for unmanned systems successfully demonstrated interoperability (2007). ViaLogy claims that it has also integrated a Lightweight Chemical Detector (LCD) to validate the plug-and-play capability intended for JFPASS. The LCD is part of the soldiers hand-held equipment and is used for checking cargo, personnel or buildings for chemical warfare agents (2007, p. 1). According to ViaLogy CTO, Dr. Sandeep Gulati, JFPASS s real-time requirements present an ideal problem set for their Sensor Policy Manager (SPM). The product is designed for scalable implementations involving 100s to 1000s of sensors and video endpoints (2007, p. 2). However, due to budgetary pressures and the new JCTD model of streamlining programs, affordability will be essential to the program s viability and success. As indicated by ViaLogy, the need for increased force protection will drive procurement of new standards-based commercial-off-the shelf (COTS) products and interoperability solutions. Emerging sensors such as smart electronic fence, intrusion detection radars and video surveillance offer promising solutions for threat detection and rapid response and base operation. However, the challenge of integrating these sensor and threat detection systems over a secure network into a highly reliable system-ofsystems with both lethal and non-lethal response capabilities has also increased significantly. (2007, p. 2) Numerous COTS technologies can provide a synergy of support, which will greatly increase the JFPASS effectiveness. For example, Delta Scientific SC3000 gates were recently installed at Naval Station Pearl Harbor. Some of the technology employed in these access systems can be used in other perimeter security systems. For example, the SC3000 utilizes an RFID tag placed on authorized vehicles (2007). Rather than having a sentry grant access, vehicles need only pull within range of the sensor for the gate to 23

44 recognize the pre-authorized vehicle and grant access. These systems can even employ RFID tags that operate without batteries. Such passive systems reflect the RF signal back to the reader in order to unlock the security device. RFID gate technology could be another valuable piece of a complete JFPASS system. RFID technology can serve as a key component to automating numerous aspects of a total security system. This new technology can be incorporated into the JFPASS Decision Support System (DSS) for future use. E. THE JFPASS USED FOR INFRASTRUCTURE Critical infrastructures are important. The USA PATRIOT Act defines critical infrastructure as those systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health, safety, or any combination of those matters (National Strategy for Homeland Security, 2002, pp ). Therefore, any terrorist attack aimed at these facilities could cause grave damage to the U.S. economy and to the safety of its citizens. While not specifically mentioning the JFPASS or the changing enemy threat environment, Christian Endress, editor for Safety and Security International and a national expert on crisis management, has pointed out several new technologies designed to secure critical assets against enemy attacks (p. 79). In a recent article, Endress observed that the number of critical infrastructure targets in Europe alone is staggering (2007, p. 80). If critical infrastructure is taken to be anything that is critical for economic prosperity to include entities with important interactions with other elements then the number is truly mind-boggling (2007, p. 80). Anything from the water supply to the telecommunications system can be a potential target. Nations, therefore, have a vested interest in developing security systems that can help protect critical infrastructure. As Endress points out, fully protecting a critical asset may be extremely difficult but setting up a surveillance system to watch over those 24

45 potential targets is inherently better than not providing any sort of security (2007). Of course, the cost of a surveillance system is a key consideration in acquired levels of protection. Perimeter security products can be employed as another layer of defense. While observation-based systems may not stop an attack, they provide critical early warning about impending danger. Numerous countries have focused on methods of protecting critical infrastructure. In the United States, the Department of Homeland Security has identified 17 Critical Infrastructures and Key Resources Sectors: Agriculture and Food Banking and Finance Chemical Production Commercial Facilities Communications Dams Defense Industrial Base Emergency Systems Energy Government Facilities Information Technology National Monuments and Icons Nuclear Reactors, Materials and Waste Postal and Shipping Public Health and Health Care Transportation Systems Water (National Strategy for Homeland Security, 2002) Should these critical infrastructures become damaged, destroyed, or contaminated, this nation s security, economy, public health, safety, or a combination thereof could be jeopardized (2002). 25

46 F. SUMMARY OF CHAPTER III In this chapter, we have discussed the need for increased force protection on and around forward operating bases as well as other primary installations. JFPASS JCTD research and development shows numerous applicable COTS technologies. In order to create a system synergy, a common communication protocol is required to enhance the interoperability of the system-of-systems. The JFPASS is a JCTD that can make an immediate impact. In short, this technology network can provide the capability to meet the changing enemy threat with current technology. 26

47 IV. DEFINING THE JFPASS A. INTRODUCTION A commander s need for accurate and timely information in support of complex decisions requires that application programs, intelligent agents and humans be able to exchange, analyze, interpret and report information. While interoperability of soldiers has traditionally been accomplished through the creation of tacit and explicit knowledge through training, construction of software applications and intelligent agents for training programs, the evolution of technology requires a standardized vocabulary and semantically rich formalization of common sense knowledge for the various domains of operation spanned by military planning and operations. This formalization is appropriately captured in ontologies (specifications of conceptualizations) that provide representation vocabularies and facilitates information exchange (Burk et al., 2007). This chapter provides a detailed description of JFPASS, which provides the information of value added. In Chapters II and III, the process in which JFPASS would provide the WF an advantage was described by how FP would be increased and by what systems would be used. The JFPASS would interface current FP systems that would increase the interoperability of COTS to decrease an enemy threat. Interoperability has always been a primary objective of any program within the DoD development and acquisition process. The new idea is application of what maturing technology can provide the military, what JFPASS can provide the WF, volumes of data and pertinent intelligent information. First, we must define four key words that are the baseline for understanding the JFPASS. They are as follows, outlined in the IAP for the JFPASS JCTD (October 2008): Automation: Combining data points to automatically perform a task otherwise done by an operator. Integration: As defined in the JFPASS JCTD, there are two aspects that determine full integration. First, the fundamental aspect of technical integration is the baseline requirement for a system/technology 27

48 to work within the digital architecture of the JCTD utilizing ICD-0100b. Second, the integrated component must be fully controllable from any BC station or operator station. Interoperability: Joint Publication 1-02 defines interoperability as 1. The ability to operate in synergy in the execution of assigned tasks. 2. The condition achieved among communications-electronics systems or items of communications-electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users. Fusion: Fusion may be defined as a series of processes performed to transform observational data into more detailed and refined information, knowledge, and understanding. Additionally, intelligence and context are key contributors to the JFPASS. B. WHAT DOES INTELLIGENCE MEAN TO THE JFPASS How do researchers talk about intelligence in the context of a machine? Some could argue that even though a computer is able to store vast amounts of data and is capable of processing millions of computations per second, it is nevertheless only a machine that is entirely restricted to following predefined instructions (Pohl, 2004). Based on this perception, it is important to briefly discuss the concept of intelligence and the sense in which this perception is applied to computer software (2004). Intelligence within a machine differs, however, from a human s path toward a new idea or solution to an existing problem. Both use pre-existing relationships to analyze and produce a logical solution. Machines are restricted by the limitations of the human and the human is restricted by that experience and education. Some might argue that machines are bound only by its predefined instructions. The same argument applies in a sense to humans -- in which growth and education determine the ability to discover the means to understand empirical data. By comparison, computers, despite their restrictions, can evolve much faster than humans can. Where humans take generations for 28

49 evolution to occur in their intellectual abilities, well-designed computers revolutionize capabilities within years. These abilities greatly differ due to the advancements in technology over the last twenty years. In his paper, Dr. Pohl states: Webster s Dictionary (Random 1999) defines intelligence as the capacity for learning, reasoning, and understanding. This definition suggests that there are component capabilities that contribute to the concept of intelligence. Further, these component capabilities are not necessarily powerful. In other words, it may be argued that there are levels of intelligence and that at the lowest level such capabilities must include at least the ability to remember. Higher levels of intelligence include reasoning, learning, discovering, and creating. Certainly at least some of these intelligent capabilities can be embedded in computer software (Pohl 2004). Intelligent software has the ability to create relations needed by building an ontology with all pre-existing systems, thus providing support to the growing demand for information that is accurate, timely and high quality. However, the information is only as good as the context it is provided. C. WHY IS CONTEXT IMPORTANT IN DEFINING THE JFPASS A current myth is that computers are the backbone of the Information Age because they can store and process vast amounts of data. However, we must remember the only purpose for storing data is for later use (Pohl, 2004). DoD s computer-based systems do not automatically analyze data; they require human interaction to interpret the data provided. Derived data or Context 5 is the key ingredient that is missing (Pohl, 2004). Context is the interpretation of data by the user in a logical and applicable way (Pohl, 2004). The question that JFPASS must answer is: can software provide valuable and pertinent information with COAs to respond to the threat inferred from the intelligence gathered? Basically, the JFPASS must provide intelligent information on its own to the WF with no interaction from the WF. 5 Taken from a lecture on IT Systems in SCM by Dr. Jens Pohl, 21 OCT 2008, NPS, Monterey, CA. 29

50 D. DATA-CENTRIC ENVIRONMENT 1. Current Situation and the Need for Intelligent Software With technology revolutionizing, the way the world views force protection the intelligent software interprets and answers questions. The need for intelligent software to discard irrelevant information and analyze only relevant data is key to timely, accurate and useful information for decision-making for the WF. There are two primary reasons for software to incorporate intelligent software capabilities. First is to reduce the current bottleneck in data processing stream. Over the past 20 years, electronic data storage capabilities have greatly increased the availability of timely and relevant information but have (paradoxically perhaps) increased the time needed to take action. This problem is due to the historic belief that it is the user s responsibility to interpret the data into information and knowledge, aided by the computer-based system. In the past, computer systems have been manipulated by users; systems store and retrieve the data erroneously. This does not, however, provide useful information in a context similar to the question or problem initially posed. Can the JFPASS provide pertinent intelligent information? The second reason is financial. The growing complexity of communication and network systems, increasing reliability of organizations on technology information systems require research and development of intelligent software for their existence and profitability (Pohl, 2004). 2. Transition from Data to Information by Intelligent Software The interoperability of information systems is an important issue for many organizations. It is a major concern for integrating systems both within and across organizations, and in the case of this paper, across the military branches. The key deliverable is the movement from data collection and processing to providing intelligent information from data. Within the military, the planning process occurs concurrently at multiple echelons in a highly distributed environment, which are seriously impeded by: An overwhelming volume of data. Scarce timely and actionable information. 30

51 Poor vertical and horizontal communication. Uncertainty in respect to the reliability, accuracy and completeness of information. Limited ability to rapidly determine the overall current state of the planning process. (Pohl, 2004) This results in time delays, conflicting planning efforts, confusion, wasteful use of human resources, and missed opportunities (Pohl, 2004). This is due to the absence of context within the computer systems. The user must interpret and manipulate data by adding context. Unorganized data has low value, and is usually abundant -- primarily due to the collection and gathering of all data relevant to any specific area of interest, relevant or not. As movement occurs vertically, we see data increasing in value and decreasing in volume. This is due to the elimination of data that provides no value added to the specific question of problem being addressed. The JFPASS attempts to provide context in which information can be derived from data. This would be done by integrating COTS systems to build a package with significant value to the user. The JFPASS can infer context from principal components defined by the user. These components are location, time, history, urgency, activity, culture, identity, and environment. If fully successful, the JFPASS will be able to automatically gather, process, and interpret pertinent data within a user-defined context and can provide COAs to the user. 31

52 Figure 4. Transition from Data to Knowledge (Pohl, 2005) The vertical flow depicted in Figure 4 assists in understanding the relationship between the user and the computer. By adding context to data, information can be obtained for decision-making. Information becomes knowledge, which allows the WF to build upon the low-level data for the institution and creation of rules. There are distinct differences between human and computer analysis of data. Although computer information is defined by the parameters set forth by the WF/user, the computer has distinct advantages over the human approach to analysis as seen in Tables 1 and 2. 32

53 Flexibility Reliability Responsiveness Ease of use Table 1. Use is not constrained by the parameters of the designer/user Perhaps not compared to a mature system but certainly an issue for an experimental system Production can be faster but quality will suffer Learning the interface and procedures are simpler Advantages of Human Simulation Applicability Reproducibility Traceability Speed Accuracy Table 2. Feasible to simulation more complicated and longer sections of COA Can return to a situation for reexamination Traces decisions back to results and results back to data and data sources Runs much faster than real-time, and multiple runs Learning the interface and procedures are simpler Advantages of Computer Simulation Regardless of strengths, no information provided by the computer will be used to support decision making unless it also approaches the advantages of the human analysis, especially if the intelligent information provided by the software is credible and useful to the WF. E. ONTOLOGY OF INTELLIGENT SOFTWARE Ontology is similar to a dictionary or glossary but with greater detail and structure that enables computers to process its data. Ontology consists of concepts, axioms, and relationships that describe a domain of interest. That is, ontology is a description (like a formal specification of a program) of the concepts and relationships that exists for an agent or a community of agents (Gruber, 1995). Loosely translated, ontology is the entire 33

54 knowledge in a particular field. Ontologies are designed to share knowledge with and among agents within a defined field. The JFPASS agents are the COTS components that will provide the information to the WF. Recent work in Artificial Intelligence (AI) is exploring the use of formal ontologies as a way of specifying content-specific agreements for the sharing and reuse of knowledge among software entities. By creating these agreements, multiple systems can provide relative and pertinent information for the user to make decisions. We use common ontologies to describe ontological commitments for a set of agents so that they can communicate about a domain of discourse without necessarily operating on a globally shared theory (Gruber, 1995). As researchers, we say that an agent commits to an ontology if its observable actions are consistent with the definitions within the ontology. The idea of ontological commitments is based on the Knowledge- Level perspective (Gruber, 1995). However, the user or designer creates the definitions within the ontology, thus the human interface still exists. The Knowledge Level is a description of an agent s knowledge that is independent of the symbolic representation used internally. Knowledge is attributed to agents by observing their actions; an agent "knows" something if it acts as if it had the information and is acting rationally to achieve its goals. The "actions" of agents--- including knowledge base servers and knowledge-based systems---can be seen through a tell and ask functional interface, where a client interacts with an agent by making logical assertions (tell), and posing queries (ask) (Gruber, 1995). F. RISK Typically, risk management has focused on only single systems, and often only on development risks. For systems of systems, the approach has to reach beyond these boundaries and across the life cycle from before acquisition to operations, sustainment and retirement. A venture as important and as complex as creating a system of systems 34

55 to provide increased FP involves many types of risk. Both the development and testing efforts will be discussed along with identification of some potential tools to mitigate those risks. Figure 5 shows a basic risk management process that can be used to monitor and mitigate risk during the development and testing of any program. Implementation of this model can assist in elimination of waste. Figure 5. Basic Risk Management Process Model (Created by the Author) Avoidance Control Measures Key Assumptions Research Experience However, the complexity of the JFPASS will require considerations beyond those of the typical risk management model. Considerations that should be addressed are as follows. 1. Considerations for Systems of Systems Risk management is a good starting point for reviewing how acquisition processes deal with Systems of Systems (SoS). Risk analysis is typically an early step in an 35

56 acquisition and for a SoS that risk analysis is an especially critical. For a SoS, or for the more likely case of a system or component that participates in an existing SoS, an effective risk management approach should: scale to size and complexity of systems of systems incorporate dynamics integrate across full life cycle: requirements to sustainment focus on success as well as failure (Creel, 2008) 2. Scale to Size and Complexity of Systems of Systems Most traditional risk management methods cannot address the complexity that arises when multiple systems are routinely combined. State-of-the-practice risk management approaches provide stakeholders with a long list of potential problems (in the form of risks). The list for a single project, program, or technology often includes more than 100 statements of risk. For systems of systems, that list of potential problems can be overwhelming (Creel, 2008). Number Issue Issue Summary 1 Multiple Stakeholders 2 Multiple Risk Management Processes 3 Long Life Cycles 4 Common Technical Risk Causes 5 Integration Risk Differences in stakeholder s behaviors will often lead to contention and potentially sub-optimal design solutions, funding allocation, schedule priority, and increased risk. Differences in risk management processes and their implementation can lead to the omission of risks as well as exaggeration of other risks. Non-uniform acquisition maturity potentially complicates risk management Technical risks are often examined, evaluated, and managed separately, which may not provide insight into weaknesses/shortfalls. Integration risk is often not explicitly evaluated. (In the case of JFPASS, this risk would be detrimental if ignored) 6 Functional Performance Risk Functional performance risk is often not explicitly evaluated. 7 Interface Complexity It is generally difficult to evaluate interface complexity and accurately relate it to risk. Table 3. Common Systems of Systems Risk Management Issues (Conrow, 2005) 36

57 The JFPASS must also consider risks associated with existing programs of record. DoD acquisition programs already run the gamut from relatively simple to very complex. Complex hardware and software interfaces often exist within individual programs, as well as in SoSs. While there may be a desire to explicitly treat complexity in a risk analysis, it is generally difficult to accurately relate complexity to risk. Furthermore, efforts to estimate the risk of interface complexity directly may lead to uncertain, subjective, and/or erroneous results (Conrow, 2005). The JFPASS must also consider the required support for technologies under consideration. The primary key in reducing risk is effective communication between all those involved. Figure 5 can be applied to all programs for the reduction in risk, regardless of size, maturity, and complexity. G. SUMMARY OF CHAPTER IV Converting the vast amounts of raw data into comprehensive, actionable, data is truly what the WF needs from a FP system. Soldiers can process this information themselves and make intelligent decisions but often this is not the most efficient use of a limited resource. This is where the JFPASS seeks to provide aide to the WF. By compiling vast amounts of data and intelligently processing it, the JFPASS promises to deliver information to actually support operational decisions. A degree of trust (and therefore a level of risk) accompanies the WF s reliance on a machine to help make decisions in life-or-death situations. This risk is offset by the reward of enhanced information processing power. By leveraging the JFPASS technologies, more information can be processed in a shorter amount of time yielding more accurate information about the threat. The WF s task load then is then greatly reduced, which allows soldiers to concentrate their attention on higher order processes. 37

58 THIS PAGE INTENTIONALLY LEFT BLANK 38

59 V. RESULTS A. INTRODUCTION This chapter provides a framework, description, discussion and analysis of some issues and factors that must be considered in constructing a new FP system in response to the following: How does the use of force protection equipment contained in the JFPASS impact force effectiveness? Based on preliminary results of the background research (Chapter III), the JFPASS plans to create a fusion cell concept to control COTS implemented with a common communications suite of protocols to provide a common use language. Because of the diverse and complex nature of work to be performed, the JFPASS will need to craft a strategy that integrates these diverse elements to meet user requirements. A detailed discussion will address how and why specific data was collected by the project team to answer the previously question stated. Obtaining results by means of a survey, interviews and literature research enabled an answer. It is important to note that the strategy discussion and the analysis below do not capture all the issues that must be considered prior to program recommendation to OSD. However, it outlines considerations that require attention and possible solutions, including the WF s view of JFPASS. B. DEMONSTRATION STRATEGY The JFPASS JCTD Demonstration Strategy will consist of both Technical and Operational demonstrations. It will conduct two sets of demonstrations: 1. Technical Demonstration One (TD-1) will demonstrate the full suite of JFPASS JCTD capabilities in preparation for a limited utility assessment. 2. Technical Demonstration Two (TD-2) will be a preparation for the Spangdahlem site specific Operational Demonstration 2 (OD-2) / Operational Utility Assessment (OUA). The Operational Problem, Desired Capabilities, CONOPS and TTP drive each Demonstration. (JFPASS JCTD MTP, 2008, July 21) 39

60 Table 4 depicts the location for each event. EVENT Technical Demo 1 Operational Demo 1 Technical Demo 2 Operational Demo 2 Interim Capability through Extended Use Table 4. LOCATION Eglin AFB, C3 Eglin AFB, C3 Spangdahlem AB Spangdahlem AB Spangdahlem AB JFPASS JCTD Schedule (JFPASS JCTD MTP, 2008, July 21) 6 Technical Demonstrations will serve as technical checks and dress rehearsals before each Operational Demonstration (OD). A period of evaluation and internal assessment will follow TD-1 to provide the technical team with the information and time necessary to complete preparations for OD-1. OD-1 will serve to highlight the flexibility and scalability of the JFPASS JCTD system. The operational team will execute OD-1, this event provides a Limited Operational Utility Assessment (LOUA) of the full suite of sensor interfaces, data fusion, integration and automation in semi-fixed/expeditionary, and waterside environments. OD-1 may enable early transition of capabilities to the WF s pending a successful LOUA. TD-2 will serve as the final dress rehearsal in preparation for OD-2 and will provide a final Operational Utility Assessment (OUA) and report of the JFPASS JCTD capabilities. (JFPASS JCTD MTP, 2008, July 21) C. OPERATIONAL VIEW Conducting the TDs and ODs will provide opportunities for the end users to observe and participate in the assessment. They will provide instant feedback on the results. The TDs and ODs will provide an operational view of how the JFPASS will integrate the system of systems approach and how it will increase the FP capabilities. The Operational View (OV), in Figure 6 below, provides a high-level illustration of the JFPASS JCTD in its operational environment. It depicts the operational elements nodes and systems information exchange paths. This view serves to support the 6 JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP), version July

61 development of Systems Architecture. It also illustratively describes the CONOPS and supports the development of further CONOPS and TTPs. (2008, July 21) Figure 6. Operational View of the JFPASS (JFPASS JCTD MTP, 2008, July 21) 7 The researchers would like to note, however, that the operational view above assumes theoretical interoperability with zero faults in an ideal battlefield. As we know, nothing is perfect and the ability to adapt is crucial to success. The key will be to provide the JFPASS with the ability to adapt to an ever-changing battlefield and an evolving enemy threat. 7 JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP), version July

62 D. ANALYSIS 1. Importance (Scope) In our collection of data, the primary questions concerned the need for the JFPASS. As stated in Chapters II and III, the JFPASS will provide the WF a means to increase FP, both in deployed and garrison environments. However, the need for the JFPASS could not be easily ascertained from current data due to the JFPASS initiative s early stages of development. To date, only one TD had been conducted, with data needed for a comprehensive CBA has not yet available. Taking this into account, we decided to focus on effectiveness. This involved directly polling the WFs (and all those involved with the JFPASS) to assess the level of importance of the desired operational capabilities to overall mission success. 2. Collection With the creation and utilization of an operational utility assessment model, using a survey featuring direct communication with the operators experience gave the best source of data. Doing so provided control measures already established by the contractor in charge of developing the JFPASS. Incorporating a table showing the relationship between key tasks and desired capabilities allowed the importance of the JFPASS to be answered by the WF as seen in Figure 7. Doing so provided control measures already established by the contractor in charge of developing the JFPASS. 42

63 Incorporating a table (Table 5) showing the relationship between key tasks and desired capabilities allowed the importance of the JFPASS to be answered by the WF. Near Real Time / Integrated / Interoperable, Comprehensive Land and Maritime-based Reg balanced Local Force Protection (FP) Systems Scalable FP area of interest to support a single mutually supportive group (military and civilian) Compliance with regional requirements (e.g. laws, regulations, SOFAs) Suite of systems under a central core Standardized core systems training Internationally releasable system suite (between partner nations) A decision aide to select a system suite for various applications / environments CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVE R Figure 7. Mapping Tasks to Capabilities (JFPASS JCTD MTP, 2008, July 11) 8 The levels of importance were crucial in answering the level of mission success that the JFPASS would have through the WF s perspective. In Appendix A, the levels of mission success in relation to each of the five key tasks and eight desired capabilities are explained. The following analysis represents a sample size of 39 operationally experienced WF s deployed within the last 24 months. Their survey responses can be seen in Appendix D. 3. Quantitative Analysis Method a. Data Interpretation In order to derive quantitative results from the survey distributed, we wanted to analyze the trend of scores for each desired operational capability (x) as compared with the five standard key tasks (y) outlined by the lead agency the program. 8 JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP), version July

64 Upon reviewing the relative scores of the desired operational capabilities, we realized that some further insight could be derived from analyzing the standard deviation of these scores to verify what areas most consistently concerned the raters. b. Data Analysis We first averaged all survey respondent scores in each category and then averaged all categories. We forced the averages in each category to a mean of 3.0. This was accomplished by taking the difference between the overall average and 3.0 and then subtracting that value from the value in each category. This effectively smoothed our results to prevent numerous low scores in a category from artificially accentuating a single high score. Consistent raters, therefore, would show the same relative weights as raters with a much greater range of scores. Upon graphing these forced mean scores against their individual key tasks, we began to see a trend of which operational traits were most important and in which areas their importance was most significant. As shown in Figure 8 taken from Appendix E. Figure 8. Relative Weights Graph of Forced Means Score We wanted to verify that a few high scores were not the cause of these inflated averages. To determine this, we graphed the standard deviation of all survey 44

65 scores by individual desired operational capabilities. By graphing these results in a polar graph we saw a relative depiction of the amount of variation in the desired operational capabilities scores according to the performance parameters that our surveys rated against. The final result can be seen in how tight the shot group is on the target of zero variation as seen in Figure 9 taken from Appendix F. Figure 9. Near Real Time shown as a representation of means dispersion in a polar format After building our WF preference analysis, we created a model to compute an overall measure of effectiveness. By defining a field to be filled in once test data becomes available; we were able to build a formula from the product of the individual capabilities multiplied by the sum of the operational preferences across all five standard tasks. We then summed each product to produce one measure of effectiveness score. As seen in Figure 10 from Appendix G. 45

66 Measure of Effectiveness Rating Engineers / Contractors Performance Measure Operational Users Performance Preference Rating Weighted Sum Across All Capabilities Near Real Time Scalab le SOFA Compli ant Suite of System s Central Core Standar dized Training Internatio nally Releasab le Decisi on Aide CONO PS and TTPs DETECT ASSESS WARN DEFEND RECOVER SUM Overall, MOE Weighted Across All Capabilities Figure 10. Overall Effective Score Calculation Model The overall measure of effectiveness was then plotted on a polar graph with each functional area represented on a separate spoke as seen in Figure 11. Figure 11. Overall Measure of Effectiveness show as a representation of means dispersion in a polar format 46

67 Plotting the products of the test plan results with operational preferences graphically shows an effectiveness dispersion of capabilities. This graph can be used to focus performance development to match WF preferences. 4. Quantitative Results a. Measuring the Results Several interesting trends surfaced as a result of analyzing the survey responses. The desired operational capabilities all had a relatively similar level of preference from the surveyed WF s. This shows that the functional areas chosen to survey represent a well-balanced group of emphasis. However, several distinct trends emerged from our survey. For example, near real time information was clearly the most important factor for our respondents. Given the high preference score for Near Real Time information as seen in Appendix D, it is particularly interesting then that this desired operational capability had the lowest standard deviation of survey responses across all the desired operational capabilities leading to the intuitive assumption that knowing what and where the threat is occurring leads to greater mission success. A sample survey from Appendix D is shown below: 1 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Figure 12. Sample Survey Format 47

68 All eight desired capabilities were measured using the same personal preference assessment. The results were then placed in an aforementioned formula. b. Interpreting Results The scores in the near real time category across all key tasks averaged 46% higher than the scores for the other desired operational capabilities, suggesting that timely information is the most important of these traits to the WF for mission success; see Appendix B for graphical representation and Appendix H for calculations. In particular, the detection key task had the single lowest deviation, scoring 78% less than the average response. Numbers like these show a clear WF judgment that near real time information during the detection phase of an engagement is the most important component of force protection. See Appendix H. 48

69 Standard Deviation of Rating Near Real Time Scalable 78.3% SOFA Compliant lower than the average Standard Deviation rating Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs sum chart average DETECT ASSESS WARN DEFEND RECOVER SUM Forced to mean of 3: raw score - (average - 3) Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN sum DEFEND average sum average RECOVER sum 15.0 SUM % higher than the average operational capability sum lower than the average operational capability sum Figure 13. Measure of Effectiveness Calculation Tool % 49

70 The Recovery key task received the lowest scores across all desired operational capabilities, 23% less than the average evaluation score. This shows that the final phase of force protection is the least critical to the WF when it comes to engaging and eliminating a force protection threat. However, given the constrained resources within the FP arena, the interoperability of the systems of systems approach that the JFPASS will provide will lead to a level of increased security and protection. E. PROGRESS AND CHANGE As mentioned earlier, many of the issues concerning the JFPASS will be better understood only with the completion of the TDs and ODs. Changes are sure to occur after each TD, driving a change in the timing and outline of the follow on ODs. As seen in this chapter, the effectiveness of the JFPASS depends on the accurate interpretation of the WF s needs. The quality of the JFPASS will ultimately be measured by its relevance of accuracy and timeliness. 50

71 VI. DISCUSSION A. CONCLUSIONS 1. The Need for Better Force Protection Capabilities The JFPASS seems to provide much needed advantages in increasing security and decreasing the risk of losing lives, equipment, and infrastructure. This analysis provides insights about what is most important to the Warfighter (WF). With JFPASS, legacy systems can be interfaced with Commercial Off The Shelf (COTS) Force Protection (FP) systems to enable reallocation of manpower and reduction of the logistics footprint required to support. New systems, no matter how safe, have a learning curve associated with their operation and inherently have some risks. The JFPASS seeks to mitigate these risks by tying existing systems together to create a network that can provide intelligent information for better decisions. In this manner, the JFPASS avoids the learning curve dangers of other FP systems in early operations. Whatever the case may be, lack of manning, training, experience, sometimes causes FP systems to be discarded in lieu of traditional, labor-intensive FP measures such as manning the watch tower. With limited resources, FP must be given the tools and methodology to work most efficiently; the JFPASS aims to provide this capability. 2. The Way to Fill the Need of the WF with the JFPASS The JFPASS, if successfully tested and fielded, can be tailored as needed by the WF. Creating a system that fuses numerous FP systems to one location expands situational awareness. This provides the WF more accurate and pertinent information that can support decisions to effectively counter the threat. The JFPASS provides this ability with compact, portable, modular, and fast assembly kits that can be packaged in any form to meet the WF s needs. This allows the FP needed to be brought with a deploying unit or interfaced with existing FP systems on ground. Structuring JFPASS this way allows 51

72 numerous savings. Reduction in logistic footprint, reduction of transportation costs, minimal manning for installation, and reallocation of manpower are only a few that are immediately impacted by the JFPASS capability. B. RECOMMENDATIONS 1. What are the Needs that are the Focus of the JFPASS from the WF s Perspective? Accurate, real time information is important. This is especially true in the detection phase. Any WF will say that they can defeat the enemy if they know where and when the enemy will be and where they are planning to attack. However, we know that information is hardly ever available in a timely manner. Many times the enemy will have the advantage due to inability to detect the threat. Thus, in the FP arena, reaction to the threat is typically the norm. Anticipating the threat, as opposed to repelling an attack, is the basic capability the JFPASS aims to provide. The ability to gain the initiative will allow the WF to position assets to counter the threat prior to the engagement. Recovery, though a necessary step in the FP process, is the least important phase. The WF is willing to restrict the usage of limited resources in this area as it is the most removed from the detection phase. 2. Work to Mitigate the Risks Associated with the JFPASS Given the risk associated with a new system, any work done to reduce that risk will pay significant dividends. For example, redundancies in communication or processing will reduce the risk of losing connectivity. Also, frequent storing of data and providing backup power supplies will reduce the risk of the consequence of service interruptions (e.g., through primary power failure). As mentioned previously, with human life at stake, the inherent risk threshold is low and one of the most significant detractors from accepting the JFPASS as a viable FP system. 52

73 C. PAYOFF The JFPASS supports the GWOT by providing commanders on the ground and our Joint and Coalition partners with a Near Real Time, Integrated / Interoperable, Comprehensive Land and Maritime-based Regional and Local FP (FP) Systems to Counter Threats. This is a precedent-setting solution, using intelligent technology to work smarter for the WF. It provides the integration of CBRNE and Physical Security systems through the application of an integrated C2 Architecture that uses computer software and tailored decision-making rules. The JFPASS provides actionable information and allows the user to focus on the response function, quicker and with better accuracy. Currently, no other program is capable of integrating the existing COTS components and fusing them with service-acquired systems into a single integrated FP system of systems. The JFPASS will enhance FP using intelligent information in an expedited manner, allowing the WF to focus on orchestrating the response. It also provides the opportunity for future cost savings through standardization, and the re-allocation of manpower. D. WHAT IS NEXT FOR THE JFPASS Due to the lack of test and cost data, a thorough BCA cannot be supported at this time. As seen in Figure 14, the BCA is broken into two specific areas, (1) Cost and (2) Operational Effectiveness (a Score). Our group focused on the operational effectiveness portion due to absence of cost data. A full comparison of effectiveness versus cost is required to complete the BCA. 53

74 BCA CBA (Cost Analysis) Operational Effectiveness Operational Effectiveness Score Figure 14. BCA Diagram (Created by Authors) As test data becomes available, it will be assessed and fed into the operational effectiveness model to provide an operational effectiveness score. Having this score, formulated from operational experts' judgments of battlefield priorities, will allow cost data to be compared to analyze different aspects of what can be eliminated, re-allocated, or reduced in terms of FP. Comparison of effectiveness versus manpower costs can be measured to find out where or if re-allocation or reduction is a viable option and how much cost savings may be realized. The direct impact of five men versus two men is significant and could be measured using the model represented in this project once test data becomes available. Figure 15 represents the flow process in which data will travel once testing is done and acquired for input. The new data will be collected, assessed, and fed into the matrix. An effectiveness score is produced based on how operational experts interpret the key tasks mapped against the desired operational capabilities. The operation effectiveness score calculated then provides a useful tool to base future decisions. For example, areas where the JFPASS team should focus improvement efforts or it may provide a means to compare similar systems to the JFAPSS. Since the system is 54

75 currently under testing, once the tests are completed and the results tabulated and data analyzed, then that data could be used to revisit this analysis and update the effectiveness score of the JFPASS. Test Data Input Data Analysis Desired Operational Capabilities Operational Effectiveness Score Warfighters Expert Judgment Operational Effectiveness Model Key Tasks Figure 15. Operational Effectiveness Score Flow Chart (Created by Authors) However, despite the lack of test data, we conclude that JFPASS has shown clear potential to be a highly effective system to provide modernized and enhanced FP systems to meet ever-changing future threats. 55

76 E. FUTURE RESEARCH It is the authors recommendation that this work be added to the body of experience and knowledge of the JFPASS JCTD program to aid in further development research efforts not only for the JFPASS but other intelligent software exploratory programs as well. Specifically, future research might investigate why the WF s place such emphasis on the need of real time information. Perhaps, more insight may be gained into the nature of FP by clearly understanding how the WF intends to use near real-time information for operational mission enhancement. Additionally, further research could help to answer why the WF s responses indicated a general lack of concern for the recovery phase. Perhaps incoming threats are so sporadic that quickly resetting the force is not as much of a priority as originally thought. This could then lead to a more accurately tuned system that was specifically geared to react quickly to an initial threat even at the cost of recovery time. However, multiple attacks could occur, so therefore the recovery phase must not be ignored. We conclude by noting there is a great deal more research that can be done on the JFPASS to assist in assessing its potential. Additional methodologies and or tools can help managers solve the technical and engineering challenges that are sure to arise with interfacing COTS systems with new software. As with any new program, there are seldom any standard answers, however, there are opportunities to learn from the data and value-added experience to gain from programs such as the JFPASS. 56

77 APPENDIX A. JFPASS SURVEY IRB APPROVAL MEMORANDUM 57

78 THIS PAGE INTENTIONALLY LEFT BLANK 58

79 APPENDIX B. DESIRED CAPABILITIES RELEVANCE SURVEY INSTRUCTIONS JOINT FORCES PROTECTION ADVANCED SECURITY SYSTEM (JFPASS) UTILITY ASSESSMENT SURVEY Please fill in the chart, using the number scale provided, with your own opinion. Request return at your earliest opportunity. Introduction: This survey will be used as a tool to measure the operational capability of JFPASS in comparison to both the status quo (do nothing) and five competing systems. This survey is intended to provide a foundation of expert judgment for the establishment of a measure of operational utility. For the purpose of this project, this survey is meant to be all encompassing, but only a small part of the tests and studies being conducted within the JFPASS Joint. This survey will be distributed to persons with operational deployment experience via and personal contact. Risk associated with this survey is deemed as minimal to any person who volunteers to participate. No personal information is requested or required and any information linking participant with this survey will be destroyed or deleted once numerical data is collected. Additionally, conclusions derived from the data collected from this survey will be encompassed into possible future studies of JFPASS. Purpose: For the purpose of this survey, eight desired capabilities are to be assessed with respect to their contribution to successfully perform five key tasks. Your responses will then be used to formulate metrics that can be used to assess the relative importance of each of those capabilities. While not all capabilities will necessarily have direct relevance on a specific task, each task/capability should be weighted. As an operational expert in the force projection mission, we ask that you consider the relevance of the capability in relation to each specific task. What we want from you: Our specific project will analyze how each of the desired capabilities improves overall ability to provide effective force protection. Force protection is defined here as anything that enhances thwarting attempts on U.S. life, property, or infrastructure. We want your best judgment of how each of the capabilities in the table below contributes to successful accomplishment of the five force protection tasks. We understand that your assessments are subjective and the return of the survey constitutes consent in your participation. 59

80 Definitions: A listing and a brief description of the five key tasks and the eight desired capabilities are provided below. Desired Capabilities: 9 Tasks: Near Real Time / Integrated / Interoperable, Comprehensive Land and Maritime-based Reg balanced Local Force Protection (FP) Systems; Common Operating Picture (COP) tailored to suit the user s information requirements and built from fused sensor and other information sources. 2. Scalable FP area of interest to support a single integrated group (military and civilian) 3. Compliance with regional requirements (e.g. laws, regulations, SOFAs) 4. Suite of systems under a central core, ability to share information (voice data and video) with subordinate units, higher headquarters, and adjacent C2 nodes. 5. Standardized core systems training, common baseline of equipment, interface, and training standards which reduces the total lifecycle cost of ownership and facilitates the plug and play use of components among the Services and our coalition partners 6. Internationally releasable system suite (between partner nations) 7. A decision aide to select a system suite for various applications / environments 8. CONOPS and TTPs developed for the employment of the integrated system of systems. JFPASS will be tested against the following tasks, according to each task description. 1. Detect: JFPASS will demonstrate the ability to detect threats using an integrated system of sensors (including cameras, radar, and CBRNE detection). This will provide consistent detection probability results improved response both in the time required to recognize a threat and the ability to do so at greater distances from vital assets. 2. Assess: JFPASS will integrate the sensors into an automated centrally controlled processing station(s), which will evaluate the input from each of the sensor systems. JFPASS will automate the 9 JFPASS Joint Capabilities Technology Demonstration (JCTD) Management and Transition Plan (MTP), version July 2008, p Ibid 60

81 assessment process by comparing the nature of any anomaly detected by the JFPASS system with the current understanding of any known threat and the potential for the anomaly to become a threat (i.e., presence of explosive components or precursors). JFPASS will then automatically provide the system operator with recommended courses of action. 3. Warn: JFPASS will provide situational awareness and information for decision makers. An internet worked system of JFPASS enabled units, bases and installations will disseminate warnings via a network in order to mitigate the effects of dispersed coordinated attacks. 4. Defend: JFPASS will automate the defense actions by centrally managing the deployment of passive defensive measures and providing the local commander with situational awareness regarding the status of the defensive measures. 5. Recover: Although the JFPASS will not directly contribute to the recovery function, the synergistic effect of integration and automation within the other areas of the FP construct will help in resuming effective operations and provide a deterrent against further attacks. Numerical Evaluation Scores: (Level importance of task from the operational perspective in relation to desired capability) 11 5 Significantly impacts mission success 4 Enhances mission success 3 Impacts mission success 2 Minimal impact on mission success 1 No impact on mission success HIGH LEVEL OF IMPORTANCE LOW Every block should receive a numerical value, or will be assumed as no impact. See example below on how to properly fill in the chart using the numerical scale listed above. 11 Mathew J. Fowler, Acquisition Strategies for Aging Aircraft: Modernizing The Marine Corps CH- 53 Super Stallion Helicopter, Thesis, NPS (December 2001). 61

82 Near Real Time / Integrated / Interoperable, Comprehensive Land and Maritime-based Reg balanced Local Force Protection (FP) Systems Scalable FP area of interest to support a single mutually supportive group (military and civilian) Compliance with regional requirements (e.g. laws, regulations, SOFAs) Suite of systems under a central core Standardized core systems training Internationally releasable system suite (between partner nations) A decision aide to select a system suite for various applications / environments CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER TASKS WEIGHTING IMPORTANCE 12 (Example Format) REMEMBER: Each block should have a numerical value assigned. Instructions for returning: 1-Download SURVEY FORM.doc and save as JFPASS_SURVEY to your desktop. 2-Attach saved doc s to or mail / fax to: (jbsymmes@nps.edu) Fax: ATTN: NPS JFPASS SURVEY, Mail: ATTN: NPS JFPASS SURVEY, 995 Newington St, Salinas CA POC: MAJ Mark McGovern (mtmcgove@nps.edu) 12 Fowler, Acquisition Strategies for Aging Aircraft. 62

83 APPENDIX C. DESIRED CAPABILITIES RELEVANCE SURVEY JOINT FORCES PROTECTION ADVANCED SECURITY SYSTEM (JFPASS) UTILITY ASSESSMENT SURVEY Please fill in the chart, using the number scale provided, with your own opinion. Near Real Time / Integrated / Interoperable, Comprehensive Land and Maritime-based Reg balanced Local Force Protection (FP) Systems Scalable FP area of interest to support a single mutually supportive group (military and civilian) Compliance with regional requirements (e.g. laws, regulations, SOFAs) Suite of systems under a central core Standardized core systems training Internationally releasable system suite (between partner nations) A decision aide to select a system suite for various applications / environments CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Request return at your earliest opportunity. TASKS WEIGHTING IMPORTANCE 13 Numerical Evaluation Scores: (Level importance of task from the operational perspective in relation to desired capability) 14 5 Significantly impacts mission success 4 Enhances mission success 3 Impacts mission success 2 Minimal impact on mission success 1 No impact on mission success HIGH LEVEL OF IMPORTANCE LOW 13 Fowler, Acquisition Strategies for Aging Aircraft. 14 Ibid. 63

84 REMEMBER: Each block should have a numerical value assigned. Instructions for returning: Note: Return of the survey constitutes consent. 1-Download SURVEY FORM.doc and save as JFPASS_SURVEY to your desktop. 2-Attach saved doc s to or mail / fax to: (jbsymmes@nps.edu) Fax: ATTN: NPS JFPASS SURVEY, Mail: ATTN: NPS JFPASS SURVEY, 995 Newington St, Salinas CA

85 APPENDIX D. JFPASS SURVEY PREFERENCE ROLLUP 1 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

86 6 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

87 11 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

88 16 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

89 21 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

90 26 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

91 31 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

92 36 Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER Near Real Time Scalable SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER

93 APPENDIX E. SURVEY PREFERENCE RESULTS This graph shows the WF preferences of operational capabilities graphed according to the five standard key tasks along the X axis. This clearly shows a preference for near real time capability. This graph also shows how the WFs consider the Recovery phase to be the least important key task. 73

94 THIS PAGE INTENTIONALLY LEFT BLANK 74

95 APPENDIX F. POLAR GRAPH OF STANDARD DEVIATION OF NEAR REAL TIME RESULTS This graph shows the extremely low deviation in responses for the importance of the Near Real Time operational capability. Specifically, the Detection phase was the Key Task that had the least variability in responses. 75

96 THIS PAGE INTENTIONALLY LEFT BLANK 76

97 APPENDIX G. MEASURE OF EFFECTIVENESS CALCULATION TOOL 1 Measure of Effectiveness Rating Engineers / Contractors Performance Measure Operational Users Performance Preference Rating Weighted Sum Across All Capabilities Near Real Time Scalab le SOFA Compli ant Suite of System s Central Core Standar dized Training Internatio nally Releasab le Decisi on Aide CONO PS and TTPs DETECT ASSESS WARN DEFEND RECOVER SUM Overall, MOE Weighted Across All Capabilities In order to determine an overall measure of effectiveness score, we created a field to be filled in once performance data becomes available. The chart above multiplies that performance score by the weighted preference sum derived from our surveys. The total of all these preferences across all operational capabilities gives an overall, weighted measure of effectiveness score. This tool could be very useful for analyzing how relative changes in specific areas of performance affect the overall system effectiveness. This tool drives the polar measure of effectiveness graph seen in Figure 7. 77

98 THIS PAGE INTENTIONALLY LEFT BLANK 78

99 APPENDIX H. MEASURE OF EFFECTIVENESS CALCULATION TOOL 2 Standard Deviation of Rating Near Real Time Scalable 78.3% SOFA Compliant lower than the average Standard Deviation rating Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs sum chart average DETECT ASSESS WARN DEFEND RECOVER SUM sum average 15.0 Forced to mean of 3: Near Real Time Scalable raw score - (average - 3) SOFA Compliant Suite of Systems Central Core Standardized Training Internationally Releasable Decision Aide CONOPS and TTPs DETECT ASSESS WARN DEFEND RECOVER SUM sum sum average % higher than the average operational capability sum 22.6% lower than the average operational capability sum 79

Joint Force Protection Advanced Security System (JFPASS)

Joint Force Protection Advanced Security System (JFPASS) Joint Capability Technology Demonstration (JCTD) Proposed FY08 Start Joint Force Protection Advanced Security System (JFPASS) 24 October 2007 Mr. Carlos Kiko Lama JFPASS JCTD Technical Manager carlos.lama@navy.mil

More information

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) Department of Defense INSTRUCTION NUMBER 3224.03 October 1, 2007 USD(AT&L) SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) References: (a) DoD Directive 3224.3,

More information

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan i Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO) UNCLASSIFIED Rapid Reaction Technology Office Overview and Objectives Mr. Benjamin Riley Director, Rapid Reaction Technology Office (RRTO) Breaking the Terrorist/Insurgency Cycle Report Documentation Page

More information

First Announcement/Call For Papers

First Announcement/Call For Papers AIAA Strategic and Tactical Missile Systems Conference AIAA Missile Sciences Conference Abstract Deadline 30 June 2011 SECRET/U.S. ONLY 24 26 January 2012 Naval Postgraduate School Monterey, California

More information

Subj: CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DEFENSE REQUIREMENTS SUPPORTING OPERATIONAL FLEET READINESS

Subj: CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DEFENSE REQUIREMENTS SUPPORTING OPERATIONAL FLEET READINESS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3400.10G N9 OPNAV INSTRUCTION 3400.10G From: Chief of Naval Operations Subj: CHEMICAL,

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System Report No. DODIG-2012-005 October 28, 2011 DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System Report Documentation Page Form Approved OMB No.

More information

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

1. Purpose. To implement the guidance set forth in references (a) through (e) by: DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 3300.2C DUSN SECNAV INSTRUCTION 3300.2C From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Distributed Common Ground System-Navy Increment 2 (DCGS-N Inc 2) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of

More information

Perspectives on the Analysis M&S Community

Perspectives on the Analysis M&S Community v4-2 Perspectives on the Analysis M&S Community Dr. Jim Stevens OSD/PA&E Director, Joint Data Support 11 March 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

San Francisco Bay Area

San Francisco Bay Area San Francisco Bay Area PREVENTIVE RADIOLOGICAL AND NUCLEAR DETECTION REGIONAL PROGRAM STRATEGY Revision 0 DRAFT 20 October 2014 Please send any comments regarding this document to: Chemical, Biological,

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5721.01B DISTRIBUTION: A, B, C, J, S THE DEFENSE MESSAGE SYSTEM AND ASSOCIATED LEGACY MESSAGE PROCESSING SYSTEMS REFERENCES: See Enclosure B.

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533

More information

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS) EXCERPT FROM CONTRACTS W9113M-10-D-0002 and W9113M-10-D-0003: C-1. PERFORMANCE WORK STATEMENT SW-SMDC-08-08. 1.0 INTRODUCTION 1.1 BACKGROUND WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT

More information

Science and Technology Conference for Chem-Bio Information Systems

Science and Technology Conference for Chem-Bio Information Systems Science and Technology Conference for Chem-Bio Information Systems Joint Requirements Office for Chemical, Biological, Radiological, and Nuclear Defense (JRO for CBRND) 24-28 October 2005 1 JRO CBRN Defense

More information

REQUIREMENTS TO CAPABILITIES

REQUIREMENTS TO CAPABILITIES Chapter 3 REQUIREMENTS TO CAPABILITIES The U.S. naval services the Navy/Marine Corps Team and their Reserve components possess three characteristics that differentiate us from America s other military

More information

Subj: MISSION, FUNCTIONS, AND TASKS OF NAVAL SPECIAL WARFARE COMMAND

Subj: MISSION, FUNCTIONS, AND TASKS OF NAVAL SPECIAL WARFARE COMMAND DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 OPNAVINST 5450.221E N3/N5 OPNAV INSTRUCTION 5450.221E From: Chief of Naval Operations Subj: MISSION,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 28 APRIL 2014 Operations AIR FORCE EMERGENCY MANAGEMENT PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

C4I System Solutions.

C4I System Solutions. www.aselsan.com.tr C4I SYSTEM SOLUTIONS Information dominance is the key enabler for the commanders for making accurate and faster decisions. C4I systems support the commander in situational awareness,

More information

AUSA BACKGROUND BRIEF

AUSA BACKGROUND BRIEF AUSA BACKGROUND BRIEF No. 46 January 1993 FORCE PROJECTION ARMY COMMAND AND CONTROL C2) Recently, the AUSA Institute of Land Watfare staff was briefed on the Army's command and control modernization plans.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 May 3, 2002 Certified Current as of November 21, 2003 SUBJECT: Pentagon Force Protection Agency DA&M References: (a) Title 10, United States Code (b) DoD

More information

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A EOT_PW_icon.ppt 1 Mark A. Rivera Boeing Phantom Works, SD&A 5301 Bolsa Ave MC H017-D420 Huntington Beach, CA. 92647-2099 714-896-1789 714-372-0841 mark.a.rivera@boeing.com Quantifying the Military Effectiveness

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.16 October 6, 2015 ATSD(PA) SUBJECT: Nuclear-Radiological Incident Public Affairs (PA) Guidance References: See Enclosure 1 1. PURPOSE. This instruction reissues

More information

5 th Annual EOD/IED & Countermine Symposium

5 th Annual EOD/IED & Countermine Symposium Defense Strategies Institute professional educational forum: 5 th Annual EOD/IED & Countermine Symposium Advancing Counter-IED Capabilities & Decision Support at Home and Abroad November 14-15, 2017 Mary

More information

UNCLASSIFIED. Cost To Complete Total Program Element Continuing Continuing : Physical Security Equipment

UNCLASSIFIED. Cost To Complete Total Program Element Continuing Continuing : Physical Security Equipment COST ($ in Millions) Prior Years FY 2013 FY 2014 Base OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 3.350 3.874 - - - 1.977 - - - Continuing Continuing 645121: Physical

More information

Test and Evaluation Strategies for Network-Enabled Systems

Test and Evaluation Strategies for Network-Enabled Systems ITEA Journal 2009; 30: 111 116 Copyright 2009 by the International Test and Evaluation Association Test and Evaluation Strategies for Network-Enabled Systems Stephen F. Conley U.S. Army Evaluation Center,

More information

Test and Evaluation of Highly Complex Systems

Test and Evaluation of Highly Complex Systems Guest Editorial ITEA Journal 2009; 30: 3 6 Copyright 2009 by the International Test and Evaluation Association Test and Evaluation of Highly Complex Systems James J. Streilein, Ph.D. U.S. Army Test and

More information

The current Army operating concept is to Win in a complex

The current Army operating concept is to Win in a complex Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

UNCLASSIFIED. R-1 Program Element (Number/Name) PE J / Joint Integrated Air & Missile Defense Organization (JIAMDO) Prior Years FY 2013 FY 2014

UNCLASSIFIED. R-1 Program Element (Number/Name) PE J / Joint Integrated Air & Missile Defense Organization (JIAMDO) Prior Years FY 2013 FY 2014 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 The Joint Staff Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST ($ in Millions)

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #62

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #62 COST ($ in Millions) Prior Years FY 2013 FY 2014 Base OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.051-3.926-3.926 4.036 4.155 4.236 4.316 Continuing Continuing

More information

Shadow 200 TUAV Schoolhouse Training

Shadow 200 TUAV Schoolhouse Training Shadow 200 TUAV Schoolhouse Training Auto Launch Auto Recovery Accomplishing tomorrows training requirements today. Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 6490.02E February 8, 2012 USD(P&R) SUBJECT: Comprehensive Health Surveillance References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues DoD Directive (DoDD)

More information

A udit R eport. Office of the Inspector General Department of Defense. Report No. D October 31, 2001

A udit R eport. Office of the Inspector General Department of Defense. Report No. D October 31, 2001 A udit R eport ACQUISITION OF THE FIREFINDER (AN/TPQ-47) RADAR Report No. D-2002-012 October 31, 2001 Office of the Inspector General Department of Defense Report Documentation Page Report Date 31Oct2001

More information

Unclassified/FOUO RAMP. UNCLASSIFIED: Dist A. Approved for public release

Unclassified/FOUO RAMP. UNCLASSIFIED: Dist A. Approved for public release Unclassified/FOUO RAMP UNCLASSIFIED: Dist A. Approved for public release Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

UNCLASSIFIED. FY 2017 Base FY 2017 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Office of the Secretary Of Defense Date: February 2016 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

Dynamic Training Environments of the Future

Dynamic Training Environments of the Future Dynamic Training Environments of the Future Mr. Keith Seaman Senior Adviser, Command and Control Modeling and Simulation Office of Warfighting Integration and Chief Information Officer Report Documentation

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 December 19, 2008 DA&M SUBJECT: Pentagon Force Protection Agency (PFPA) References: See Enclosure 1 1. PURPOSE. This Directive, under the authority vested

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Tactical Mission Command (TMC) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of Contents Common Acronyms and Abbreviations

More information

Report Documentation Page

Report Documentation Page Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century NAVAL SURFACE WARFARE CENTER DAHLGREN DIVISION Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century Presented by: Ms. Margaret Neel E 3 Force Level

More information

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System Captain Michael Ahlstrom Expeditionary Warfare School, Contemporary Issue Paper Major Kelley, CG 13

More information

Subj: CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DEFENSE REQUIREMENTS SUPPORTING OPERATIONAL READINESS

Subj: CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DEFENSE REQUIREMENTS SUPPORTING OPERATIONAL READINESS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3400.10H N9 OPNAV INSTRUCTION 3400.10H From: Chief of Naval Operations Subj: CHEMICAL,

More information

FORWARD, READY, NOW!

FORWARD, READY, NOW! FORWARD, READY, NOW! The United States Air Force (USAF) is the World s Greatest Air Force Powered by Airmen, Fueled by Innovation. USAFE-AFAFRICA is America s forward-based combat airpower, delivering

More information

Software Intensive Acquisition Programs: Productivity and Policy

Software Intensive Acquisition Programs: Productivity and Policy Software Intensive Acquisition Programs: Productivity and Policy Naval Postgraduate School Acquisition Symposium 11 May 2011 Kathlyn Loudin, Ph.D. Candidate Naval Surface Warfare Center, Dahlgren Division

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: June 2008

Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: June 2008 Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: David Gillis Approved for PUBLIC RELEASE; Distribution is UNLIMITED Report Documentation

More information

World-Wide Satellite Systems Program

World-Wide Satellite Systems Program Report No. D-2007-112 July 23, 2007 World-Wide Satellite Systems Program Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Air Force DATE: February 2012 COST ($ in Millions) Total FY 2014 FY 2015 FY 2016 FY 2017 Air Force Page 1 of 14 R-1 Line #147 Cost To Complete Total

More information

NG-J3/7 CNGBI DISTRIBUTION: A 31 October 2014 CONTINUITY OF OPERATIONS (COOP) PROGRAM POLICY

NG-J3/7 CNGBI DISTRIBUTION: A 31 October 2014 CONTINUITY OF OPERATIONS (COOP) PROGRAM POLICY CHIEF NATIONAL GUARD BUREAU INSTRUCTION NG-J3/7 CNGBI 3302.01 DISTRIBUTION: A CONTINUITY OF OPERATIONS (COOP) PROGRAM POLICY References: See Enclosure B. 1. Purpose. This instruction establishes National

More information

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 FUNCTIONAL Acquisition APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 ROLE Plans for, develops, and procures everything from initial spare parts to complete weapons and support systems,

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Army Contract Writing System (ACWS) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of Contents Common Acronyms and

More information

Autonomous Systems: Challenges and Opportunities

Autonomous Systems: Challenges and Opportunities Autonomous Systems: Challenges and Opportunities Topic 9: C2 Architectures and Technologies Mr. José Carreño Mr. George Galdorisi Mr. Steven Koepenick Ms. Rachel Volner May 14, 2010 2 My view is that technology

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1) Defense Acquisition Management Information Retrieval

More information

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob Infantry Companies Need Intelligence Cells Submitted by Captain E.G. Koob Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144. Department of Defense INSTRUCTION NUMBER 8410.02 December 19, 2008 ASD(NII)/DoD CIO SUBJECT: NetOps for the Global Information Grid (GIG) References: See Enclosure 1 1. PURPOSE. This Instruction, issued

More information

AUTOMATIC IDENTIFICATION TECHNOLOGY

AUTOMATIC IDENTIFICATION TECHNOLOGY Revolutionary Logistics? Automatic Identification Technology EWS 2004 Subject Area Logistics REVOLUTIONARY LOGISTICS? AUTOMATIC IDENTIFICATION TECHNOLOGY A. I. T. Prepared for Expeditionary Warfare School

More information

UNCLASSIFIED FY 2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2008 Exhibit R-2

UNCLASSIFIED FY 2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2008 Exhibit R-2 Exhibit R-2 PROGRAM ELEMENT: 0605155N PROGRAM ELEMENT TITLE: FLEET TACTICAL DEVELOPMENT AND EVALUATION COST: (Dollars in Thousands) Project Number & Title FY 2007 Actual FY 2008 FY 2009 FY 2010 FY 2011

More information

Expeditionary Maneuver Warfare Department ONR Code 30 Dr. John Pazik Department Head

Expeditionary Maneuver Warfare Department ONR Code 30 Dr. John Pazik Department Head DCN #: 43-2882-17 Expeditionary Maneuver Warfare Department ONR Code 30 Dr. John Pazik Department Head 2 ONR 30: Expeditionary Maneuver Warfare N091 Principal Deputy for P&R NRL ONRG Chief of Naval Research

More information

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates Exhibit R-2, RDT&E Budget Item Justification February 2008 R-1 Line Item Nomenclature: 227 0902298J Management HQ ($ IN Millions) FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 Total PE 3.078

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: DoD Munitions Requirements Process (MRP) References: See Enclosure 1 NUMBER 3000.04 September 24, 2009 Incorporating Change 1, November 21, 2017 USD(AT&L) 1.

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Navy Date: February 2015 1319: Research, Development, Test & Evaluation, Navy / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY

More information

DOD INSTRUCTION DoD SUPPORT TO INTERNATIONAL CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) INCIDENTS

DOD INSTRUCTION DoD SUPPORT TO INTERNATIONAL CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) INCIDENTS DOD INSTRUCTION 2000.21 DoD SUPPORT TO INTERNATIONAL CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) INCIDENTS Originating Component: Office of the Under Secretary of Defense for Policy Effective:

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5100.91 October 28, 2008 USD(I) SUBJECT: Joint Intelligence Interoperability Board (JIIB) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 213 Navy DATE: February 212 COST ($ in Millions) FY 211 FY 212 PE 65866N: Navy Space & Electr Warfare FY 214 FY 215 FY 216 FY 217 Cost To Complete Cost

More information

The Army Executes New Network Modernization Strategy

The Army Executes New Network Modernization Strategy The Army Executes New Network Modernization Strategy Lt. Col. Carlos Wiley, USA Scott Newman Vivek Agnish S tarting in October 2012, the Army began to equip brigade combat teams that will deploy in 2013

More information

CJCSI B Requirements Generation System (One Year Later)

CJCSI B Requirements Generation System (One Year Later) CJCSI 3170.01B Requirements Generation System (One Year Later) Colonel Michael T. Perrin Chief, Requirements and Acquisition Division, J-8 The Joint Staff 1 Report Documentation Page Report Date 15052001

More information

United States Joint Forces Command Comprehensive Approach Community of Interest

United States Joint Forces Command Comprehensive Approach Community of Interest United States Joint Forces Command Comprehensive Approach Community of Interest Distribution Statement A Approved for public release; distribution is unlimited 20 May 2008 Other requests for this document

More information

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2 Exhibit R-2 PROGRAM ELEMENT: 0605155N PROGRAM ELEMENT TITLE: FLEET TACTICAL DEVELOPMENT AND EVALUATION COST: (Dollars in Thousands) Project Number & Title FY 2006 Actual FY 2007 FY 2008 FY 2009 FY 2010

More information

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN CNATRA STAFF INSTRUCTION 3300.1A DEPARTMENT OF THE NAVY CHIEF OF NAVAL AIR TRAINING 250 LEXINGTON BLVD SUITE 102 CORPUS CHRISTI TX 78419-5041 CNATRASTAFFINST 3300.1A 00 Subj: CHIEF OF NAVAL AIR TRAINING

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Army DATE: April 2013 COST ($ in Millions) All Prior FY 2014 Years FY 2012 FY 2013 # Base FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Base Information Transport Infrastructure Wired (BITI Wired) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of Contents

More information

Joint Test & Evaluation Program

Joint Test & Evaluation Program Joint Test & Evaluation Program Program Overview Mr. Mike Crisp Deputy Director Air Warfare DOT&E March 22, 2005 Mr. Jim Thompson Joint Test and Evaluation Program Manager 1 What is the JT&E Program? DOT&E

More information

The Army s Mission Command Battle Lab

The Army s Mission Command Battle Lab The Army s Mission Command Battle Lab Helping to Improve Acquisition Timelines Jeffrey D. From n Brett R. Burland 56 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

Creating Capability Surprise for Irregular Warfare

Creating Capability Surprise for Irregular Warfare UNCLASSIFIED Creating Capability Surprise for Irregular Warfare 7 TH ANNUAL DISRUPTIVE TECHNOLOGIES CONFERENCE Joint Capability Area Track II: Force Application Force Support Logistics Protection UNCLASSIFIED

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

JOINT STAFF FY 2005 Budget Estimates Research, Development, Test, and Evaluation (RDT&E), Defense-Wide. Exhibit R-2, RDT&E Budget Item Justification

JOINT STAFF FY 2005 Budget Estimates Research, Development, Test, and Evaluation (RDT&E), Defense-Wide. Exhibit R-2, RDT&E Budget Item Justification Exhibit R-2, RDT&E Budget Item Justification Exhibit R-2, RDT&E Budget Item Justification : February 2004 RDT&E, Defense Wide, Joint Staff 0400 / BA7 R-1 ITEM NOMENCLATURE: 194 PE: 0902298J Management

More information

Joint Capabilities to Combat Weapons of Mass Destruction

Joint Capabilities to Combat Weapons of Mass Destruction Joint Capabilities to Combat Weapons of Mass Destruction DoD Chemical and Biological Defense Advance Planning Briefing for Industry 4 April 2007 Presented by: Colonel Patrick J. Sharon, USA Deputy Director,

More information

Life Support for Trauma and Transport (LSTAT) Patient Care Platform: Expanding Global Applications and Impact

Life Support for Trauma and Transport (LSTAT) Patient Care Platform: Expanding Global Applications and Impact ABSTRACT Life Support for Trauma and Transport (LSTAT) Patient Care Platform: Expanding Global Applications and Impact Matthew E. Hanson, Ph.D. Vice President Integrated Medical Systems, Inc. 1984 Obispo

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4140.25 June 25, 2015 Incorporating Change 1, October 6, 2017 USD(AT&L) SUBJECT: DoD Management Policy for Energy Commodities and Related Services References: See

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 Cost To Complete Program Element 19.873 20.466 20.954 0.000 20.954 21.254 21.776 22.071 22.305 Continuing Continuing 771: Link-16

More information

NORAD and USNORTHCOM J8 Science & Technology

NORAD and USNORTHCOM J8 Science & Technology NORAD and USNORTHCOM J8 Science & Technology Mr. Rob Brunner Chief Engineer, Science and Technology NORAD and USNORTHCOM We Have The Watch 1 Mission & Enduring Priorities Advance and improve the efficiency

More information

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance and Modernization David Ford Sandra Hom Thomas Housel

More information

Planning Terrorism Counteraction ANTITERRORISM

Planning Terrorism Counteraction ANTITERRORISM CHAPTER 18 Planning Terrorism Counteraction At Army installations worldwide, terrorism counteraction is being planned, practiced, assessed, updated, and carried out. Ideally, the total Army community helps

More information

6 th Annual Joint Civil & DoD CBRN Symposium

6 th Annual Joint Civil & DoD CBRN Symposium Defense Strategies Institute professional educational forum: 6 th Annual Joint Civil & DoD CBRN Symposium ~ Advancing a Government Wide Approach to CBRN Defense, Readiness & Response ~ March 5-6, 2018

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 1300.22 October 30, 2015 USD(P&R) SUBJECT: Mortuary Affairs Policy References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 1300.22E

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE NUMBER 5144.1 May 2, 2005 DA&M SUBJECT: Assistant Secretary of Defense for Networks and Information Integration/ DoD Chief Information Officer (ASD(NII)/DoD CIO) Reference:

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018 Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Army DATE: April 2013 COST ($ in Millions) Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018 To Program Element - 9.557 9.876 13.592-13.592

More information

Annual Automated ISR and Battle Management Symposium

Annual Automated ISR and Battle Management Symposium Defense Strategies Institute professional educational forum: 6th Annual Automated ISR and Battle Management Symposium February 13-14, 2018: Mary M. Gates Learning Center 701 N. Fairfax St. Alexandria,

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B) Defense Acquisition Management Information Retrieval (DAMIR)

More information

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of The LOGCAP III to LOGCAP IV Transition in Northern Afghanistan Contract Services Phase-in and Phase-out on a Grand Scale Lt. Col. Tommie J. Lucius, USA n Lt. Col. Mike Riley, USAF The U.S. military has

More information

UNCLASSIFIED UNCLASSIFIED. EXHIBIT R-2, RDT&E Budget Item Justification RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA-7

UNCLASSIFIED UNCLASSIFIED. EXHIBIT R-2, RDT&E Budget Item Justification RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA-7 CLASSIFICATION: EXHIBIT R-2, RDT&E Budget Item Justification APPROPRIATION/BUDGET ACTIVITY RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA-7 R-1 ITEM NOMENCLATURE 0305205N Endurance Unmanned Aerial Vehicles

More information